Update recent feed data
This commit is contained in:
parent
af87bb55dc
commit
58ce4e6181
3 changed files with 67 additions and 56 deletions
|
@ -13,7 +13,7 @@
|
||||||
"full_name": "iSee857/CVE-2025-24813-PoC",
|
"full_name": "iSee857/CVE-2025-24813-PoC",
|
||||||
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
|
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
|
||||||
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
|
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
|
||||||
"stargazers_count": 83,
|
"stargazers_count": 84,
|
||||||
"forks_count": 25,
|
"forks_count": 25,
|
||||||
"created_at": "2025-03-13T10:00:03Z"
|
"created_at": "2025-03-13T10:00:03Z"
|
||||||
},
|
},
|
||||||
|
@ -125,6 +125,15 @@
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"created_at": "2025-03-21T18:05:27Z"
|
"created_at": "2025-03-21T18:05:27Z"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "CVE-2025-24813-Scanner",
|
||||||
|
"full_name": "Mattb709/CVE-2025-24813-Scanner",
|
||||||
|
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
|
||||||
|
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
|
||||||
|
"stargazers_count": 2,
|
||||||
|
"forks_count": 0,
|
||||||
|
"created_at": "2025-04-12T19:12:39Z"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "CVE-2025-24813-apache-tomcat",
|
"name": "CVE-2025-24813-apache-tomcat",
|
||||||
"full_name": "imbas007/CVE-2025-24813-apache-tomcat",
|
"full_name": "imbas007/CVE-2025-24813-apache-tomcat",
|
||||||
|
@ -161,15 +170,6 @@
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"created_at": "2025-04-08T14:52:37Z"
|
"created_at": "2025-04-08T14:52:37Z"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name": "CVE-2025-24813-Scanner",
|
|
||||||
"full_name": "Mattb709/CVE-2025-24813-Scanner",
|
|
||||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
|
|
||||||
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
|
|
||||||
"stargazers_count": 1,
|
|
||||||
"forks_count": 0,
|
|
||||||
"created_at": "2025-04-12T19:12:39Z"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "CVE-2025-24813-PoC",
|
"name": "CVE-2025-24813-PoC",
|
||||||
"full_name": "tonyarris/CVE-2025-24813-PoC",
|
"full_name": "tonyarris/CVE-2025-24813-PoC",
|
||||||
|
@ -188,6 +188,24 @@
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"created_at": "2025-04-12T17:38:02Z"
|
"created_at": "2025-04-12T17:38:02Z"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "CVE-2025-24813",
|
||||||
|
"full_name": "Eduardo-hardvester/CVE-2025-24813",
|
||||||
|
"html_url": "https://github.com/Eduardo-hardvester/CVE-2025-24813",
|
||||||
|
"description": "Remote Code Execution (RCE) vulnerability in Apache Tomcat.",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"created_at": "2025-05-10T15:58:12Z"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "CVE-2025-24813",
|
||||||
|
"full_name": "fatkz/CVE-2025-24813",
|
||||||
|
"html_url": "https://github.com/fatkz/CVE-2025-24813",
|
||||||
|
"description": null,
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"created_at": "2025-05-11T19:50:11Z"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "CVE-2025-24813",
|
"name": "CVE-2025-24813",
|
||||||
"full_name": "manjula-aw/CVE-2025-24813",
|
"full_name": "manjula-aw/CVE-2025-24813",
|
||||||
|
@ -250,23 +268,5 @@
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"created_at": "2025-04-06T19:36:48Z"
|
"created_at": "2025-04-06T19:36:48Z"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "Spring-Boot-Tomcat-CVE-2025-24813",
|
|
||||||
"full_name": "n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813",
|
|
||||||
"html_url": "https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813",
|
|
||||||
"description": "POC for CVE-2025-24813 using Spring-Boot",
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"forks_count": 0,
|
|
||||||
"created_at": "2025-03-20T22:52:00Z"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "CVE-2025-24813-noPoC",
|
|
||||||
"full_name": "Heimd411/CVE-2025-24813-noPoC",
|
|
||||||
"html_url": "https://github.com/Heimd411/CVE-2025-24813-noPoC",
|
|
||||||
"description": null,
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"forks_count": 0,
|
|
||||||
"created_at": "2025-04-07T16:17:06Z"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,7 +13,7 @@
|
||||||
"full_name": "iSee857/CVE-2025-24813-PoC",
|
"full_name": "iSee857/CVE-2025-24813-PoC",
|
||||||
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
|
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
|
||||||
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
|
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
|
||||||
"stargazers_count": 83,
|
"stargazers_count": 84,
|
||||||
"forks_count": 25,
|
"forks_count": 25,
|
||||||
"created_at": "2025-03-13T10:00:03Z"
|
"created_at": "2025-03-13T10:00:03Z"
|
||||||
},
|
},
|
||||||
|
@ -116,6 +116,15 @@
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"created_at": "2025-03-21T18:05:27Z"
|
"created_at": "2025-03-21T18:05:27Z"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "CVE-2025-24813-Scanner",
|
||||||
|
"full_name": "Mattb709/CVE-2025-24813-Scanner",
|
||||||
|
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
|
||||||
|
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
|
||||||
|
"stargazers_count": 2,
|
||||||
|
"forks_count": 0,
|
||||||
|
"created_at": "2025-04-12T19:12:39Z"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "CVE-2025-24813-Scanner",
|
"name": "CVE-2025-24813-Scanner",
|
||||||
"full_name": "issamjr/CVE-2025-24813-Scanner",
|
"full_name": "issamjr/CVE-2025-24813-Scanner",
|
||||||
|
@ -161,15 +170,6 @@
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"created_at": "2025-04-08T14:52:37Z"
|
"created_at": "2025-04-08T14:52:37Z"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name": "CVE-2025-24813-Scanner",
|
|
||||||
"full_name": "Mattb709/CVE-2025-24813-Scanner",
|
|
||||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
|
|
||||||
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
|
|
||||||
"stargazers_count": 1,
|
|
||||||
"forks_count": 0,
|
|
||||||
"created_at": "2025-04-12T19:12:39Z"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "CVE-2025-24813-PoC",
|
"name": "CVE-2025-24813-PoC",
|
||||||
"full_name": "tonyarris/CVE-2025-24813-PoC",
|
"full_name": "tonyarris/CVE-2025-24813-PoC",
|
||||||
|
@ -188,6 +188,24 @@
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"created_at": "2025-04-12T17:38:02Z"
|
"created_at": "2025-04-12T17:38:02Z"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name": "CVE-2025-24813",
|
||||||
|
"full_name": "Eduardo-hardvester/CVE-2025-24813",
|
||||||
|
"html_url": "https://github.com/Eduardo-hardvester/CVE-2025-24813",
|
||||||
|
"description": "Remote Code Execution (RCE) vulnerability in Apache Tomcat.",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"created_at": "2025-05-10T15:58:12Z"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "CVE-2025-24813",
|
||||||
|
"full_name": "fatkz/CVE-2025-24813",
|
||||||
|
"html_url": "https://github.com/fatkz/CVE-2025-24813",
|
||||||
|
"description": null,
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"forks_count": 0,
|
||||||
|
"created_at": "2025-05-11T19:50:11Z"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name": "CVE-2025-24813",
|
"name": "CVE-2025-24813",
|
||||||
"full_name": "manjula-aw/CVE-2025-24813",
|
"full_name": "manjula-aw/CVE-2025-24813",
|
||||||
|
@ -250,23 +268,5 @@
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"created_at": "2025-04-09T15:20:32Z"
|
"created_at": "2025-04-09T15:20:32Z"
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "CVE-2025-24813-noPoC",
|
|
||||||
"full_name": "Heimd411/CVE-2025-24813-noPoC",
|
|
||||||
"html_url": "https://github.com/Heimd411/CVE-2025-24813-noPoC",
|
|
||||||
"description": null,
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"forks_count": 0,
|
|
||||||
"created_at": "2025-04-07T16:17:06Z"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "Spring-Boot-Tomcat-CVE-2025-24813",
|
|
||||||
"full_name": "n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813",
|
|
||||||
"html_url": "https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813",
|
|
||||||
"description": "POC for CVE-2025-24813 using Spring-Boot",
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"forks_count": 0,
|
|
||||||
"created_at": "2025-03-20T22:52:00Z"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
11
exploits/2025/CVE-2025-2753.json
Normal file
11
exploits/2025/CVE-2025-2753.json
Normal file
|
@ -0,0 +1,11 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"name": "CVE-2025-27533-Exploit-for-Apache-ActiveMQ",
|
||||||
|
"full_name": "absholi7ly/CVE-2025-27533-Exploit-for-Apache-ActiveMQ",
|
||||||
|
"html_url": "https://github.com/absholi7ly/CVE-2025-27533-Exploit-for-Apache-ActiveMQ",
|
||||||
|
"description": "exploit for CVE-2025-27533, a Denial of Service (DoS) vulnerability in Apache ActiveMQ",
|
||||||
|
"stargazers_count": 4,
|
||||||
|
"forks_count": 1,
|
||||||
|
"created_at": "2025-05-09T02:43:53Z"
|
||||||
|
}
|
||||||
|
]
|
Loading…
Add table
Reference in a new issue