diff --git a/exploits/2025/CVE-2025-2481.json b/exploits/2025/CVE-2025-2481.json index 1d17854..f444d7d 100644 --- a/exploits/2025/CVE-2025-2481.json +++ b/exploits/2025/CVE-2025-2481.json @@ -13,7 +13,7 @@ "full_name": "iSee857/CVE-2025-24813-PoC", "html_url": "https://github.com/iSee857/CVE-2025-24813-PoC", "description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)", - "stargazers_count": 83, + "stargazers_count": 84, "forks_count": 25, "created_at": "2025-03-13T10:00:03Z" }, @@ -125,6 +125,15 @@ "forks_count": 0, "created_at": "2025-03-21T18:05:27Z" }, + { + "name": "CVE-2025-24813-Scanner", + "full_name": "Mattb709/CVE-2025-24813-Scanner", + "html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner", + "description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2025-04-12T19:12:39Z" + }, { "name": "CVE-2025-24813-apache-tomcat", "full_name": "imbas007/CVE-2025-24813-apache-tomcat", @@ -161,15 +170,6 @@ "forks_count": 0, "created_at": "2025-04-08T14:52:37Z" }, - { - "name": "CVE-2025-24813-Scanner", - "full_name": "Mattb709/CVE-2025-24813-Scanner", - "html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner", - "description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.", - "stargazers_count": 1, - "forks_count": 0, - "created_at": "2025-04-12T19:12:39Z" - }, { "name": "CVE-2025-24813-PoC", "full_name": "tonyarris/CVE-2025-24813-PoC", @@ -188,6 +188,24 @@ "forks_count": 0, "created_at": "2025-04-12T17:38:02Z" }, + { + "name": "CVE-2025-24813", + "full_name": "Eduardo-hardvester/CVE-2025-24813", + "html_url": "https://github.com/Eduardo-hardvester/CVE-2025-24813", + "description": "Remote Code Execution (RCE) vulnerability in Apache Tomcat.", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-05-10T15:58:12Z" + }, + { + "name": "CVE-2025-24813", + "full_name": "fatkz/CVE-2025-24813", + "html_url": "https://github.com/fatkz/CVE-2025-24813", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-05-11T19:50:11Z" + }, { "name": "CVE-2025-24813", "full_name": "manjula-aw/CVE-2025-24813", @@ -250,23 +268,5 @@ "stargazers_count": 0, "forks_count": 1, "created_at": "2025-04-06T19:36:48Z" - }, - { - "name": "Spring-Boot-Tomcat-CVE-2025-24813", - "full_name": "n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813", - "html_url": "https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813", - "description": "POC for CVE-2025-24813 using Spring-Boot", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-03-20T22:52:00Z" - }, - { - "name": "CVE-2025-24813-noPoC", - "full_name": "Heimd411/CVE-2025-24813-noPoC", - "html_url": "https://github.com/Heimd411/CVE-2025-24813-noPoC", - "description": null, - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-04-07T16:17:06Z" } ] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-24813.json b/exploits/2025/CVE-2025-24813.json index 419bbb2..a767d7b 100644 --- a/exploits/2025/CVE-2025-24813.json +++ b/exploits/2025/CVE-2025-24813.json @@ -13,7 +13,7 @@ "full_name": "iSee857/CVE-2025-24813-PoC", "html_url": "https://github.com/iSee857/CVE-2025-24813-PoC", "description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)", - "stargazers_count": 83, + "stargazers_count": 84, "forks_count": 25, "created_at": "2025-03-13T10:00:03Z" }, @@ -116,6 +116,15 @@ "forks_count": 0, "created_at": "2025-03-21T18:05:27Z" }, + { + "name": "CVE-2025-24813-Scanner", + "full_name": "Mattb709/CVE-2025-24813-Scanner", + "html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner", + "description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2025-04-12T19:12:39Z" + }, { "name": "CVE-2025-24813-Scanner", "full_name": "issamjr/CVE-2025-24813-Scanner", @@ -161,15 +170,6 @@ "forks_count": 0, "created_at": "2025-04-08T14:52:37Z" }, - { - "name": "CVE-2025-24813-Scanner", - "full_name": "Mattb709/CVE-2025-24813-Scanner", - "html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner", - "description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.", - "stargazers_count": 1, - "forks_count": 0, - "created_at": "2025-04-12T19:12:39Z" - }, { "name": "CVE-2025-24813-PoC", "full_name": "tonyarris/CVE-2025-24813-PoC", @@ -188,6 +188,24 @@ "forks_count": 0, "created_at": "2025-04-12T17:38:02Z" }, + { + "name": "CVE-2025-24813", + "full_name": "Eduardo-hardvester/CVE-2025-24813", + "html_url": "https://github.com/Eduardo-hardvester/CVE-2025-24813", + "description": "Remote Code Execution (RCE) vulnerability in Apache Tomcat.", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-05-10T15:58:12Z" + }, + { + "name": "CVE-2025-24813", + "full_name": "fatkz/CVE-2025-24813", + "html_url": "https://github.com/fatkz/CVE-2025-24813", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-05-11T19:50:11Z" + }, { "name": "CVE-2025-24813", "full_name": "manjula-aw/CVE-2025-24813", @@ -250,23 +268,5 @@ "stargazers_count": 0, "forks_count": 0, "created_at": "2025-04-09T15:20:32Z" - }, - { - "name": "CVE-2025-24813-noPoC", - "full_name": "Heimd411/CVE-2025-24813-noPoC", - "html_url": "https://github.com/Heimd411/CVE-2025-24813-noPoC", - "description": null, - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-04-07T16:17:06Z" - }, - { - "name": "Spring-Boot-Tomcat-CVE-2025-24813", - "full_name": "n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813", - "html_url": "https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813", - "description": "POC for CVE-2025-24813 using Spring-Boot", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-03-20T22:52:00Z" } ] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2753.json b/exploits/2025/CVE-2025-2753.json new file mode 100644 index 0000000..6adf6ef --- /dev/null +++ b/exploits/2025/CVE-2025-2753.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2025-27533-Exploit-for-Apache-ActiveMQ", + "full_name": "absholi7ly/CVE-2025-27533-Exploit-for-Apache-ActiveMQ", + "html_url": "https://github.com/absholi7ly/CVE-2025-27533-Exploit-for-Apache-ActiveMQ", + "description": "exploit for CVE-2025-27533, a Denial of Service (DoS) vulnerability in Apache ActiveMQ", + "stargazers_count": 4, + "forks_count": 1, + "created_at": "2025-05-09T02:43:53Z" + } +] \ No newline at end of file