From 5c171fb9a97e214ddcdea82054c97e09438504c3 Mon Sep 17 00:00:00 2001 From: bpmcdevitt Date: Wed, 9 Jul 2025 01:11:55 +0000 Subject: [PATCH] Update recent feed data --- exploits/2025/CVE-2025-2479.json | 15 +---- exploits/2025/CVE-2025-2481.json | 106 +++++++++++++++--------------- exploits/2025/CVE-2025-24813.json | 76 ++++++++++----------- 3 files changed, 94 insertions(+), 103 deletions(-) diff --git a/exploits/2025/CVE-2025-2479.json b/exploits/2025/CVE-2025-2479.json index 63a260d..3914dbe 100644 --- a/exploits/2025/CVE-2025-2479.json +++ b/exploits/2025/CVE-2025-2479.json @@ -5,7 +5,7 @@ "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24799", "description": null, "stargazers_count": 24, - "forks_count": 7, + "forks_count": 8, "created_at": "2025-04-03T16:55:11Z" }, { @@ -13,7 +13,7 @@ "full_name": "MatheuZSecurity/Exploit-CVE-2025-24799", "html_url": "https://github.com/MatheuZSecurity/Exploit-CVE-2025-24799", "description": "CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection", - "stargazers_count": 21, + "stargazers_count": 22, "forks_count": 15, "created_at": "2025-04-15T04:57:39Z" }, @@ -22,7 +22,7 @@ "full_name": "Alainx277/CVE-2025-24797", "html_url": "https://github.com/Alainx277/CVE-2025-24797", "description": "Meshtastic buffer overflow vulnerability - CVE-2025-24797", - "stargazers_count": 1, + "stargazers_count": 2, "forks_count": 0, "created_at": "2025-04-16T19:04:44Z" }, @@ -34,14 +34,5 @@ "stargazers_count": 0, "forks_count": 0, "created_at": "2025-05-22T20:49:43Z" - }, - { - "name": "CVE-2025-24799-PoC", - "full_name": "realcodeb0ss/CVE-2025-24799-PoC", - "html_url": "https://github.com/realcodeb0ss/CVE-2025-24799-PoC", - "description": null, - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-03-31T15:48:12Z" } ] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2481.json b/exploits/2025/CVE-2025-2481.json index bcdf6e8..0b56058 100644 --- a/exploits/2025/CVE-2025-2481.json +++ b/exploits/2025/CVE-2025-2481.json @@ -4,7 +4,7 @@ "full_name": "absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", - "stargazers_count": 142, + "stargazers_count": 146, "forks_count": 35, "created_at": "2025-03-14T07:36:58Z" }, @@ -14,7 +14,7 @@ "html_url": "https://github.com/iSee857/CVE-2025-24813-PoC", "description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)", "stargazers_count": 86, - "forks_count": 25, + "forks_count": 26, "created_at": "2025-03-13T10:00:03Z" }, { @@ -26,6 +26,15 @@ "forks_count": 8, "created_at": "2025-04-05T18:57:08Z" }, + { + "name": "Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-", + "full_name": "mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-", + "html_url": "https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-", + "description": "Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)", + "stargazers_count": 12, + "forks_count": 2, + "created_at": "2025-05-25T13:34:18Z" + }, { "name": "cve-2025-24813_poc", "full_name": "FY036/cve-2025-24813_poc", @@ -44,15 +53,6 @@ "forks_count": 0, "created_at": "2025-03-16T11:59:59Z" }, - { - "name": "Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-", - "full_name": "mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-", - "html_url": "https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-", - "description": "Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)", - "stargazers_count": 8, - "forks_count": 2, - "created_at": "2025-05-25T13:34:18Z" - }, { "name": "Poc_for_CVE-2025-24813", "full_name": "Franconyu/Poc_for_CVE-2025-24813", @@ -117,13 +117,13 @@ "created_at": "2025-03-14T03:11:40Z" }, { - "name": "CVE-2025-24813", - "full_name": "beyond-devsecops/CVE-2025-24813", - "html_url": "https://github.com/beyond-devsecops/CVE-2025-24813", - "description": "Session Exploit", - "stargazers_count": 2, + "name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.", + "stargazers_count": 3, "forks_count": 0, - "created_at": "2025-03-24T17:47:10Z" + "created_at": "2025-04-12T17:38:02Z" }, { "name": "CVE-2025-24813", @@ -134,6 +134,15 @@ "forks_count": 0, "created_at": "2025-03-28T09:44:28Z" }, + { + "name": "CVE-2025-24813", + "full_name": "beyond-devsecops/CVE-2025-24813", + "html_url": "https://github.com/beyond-devsecops/CVE-2025-24813", + "description": "Session Exploit", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2025-03-24T17:47:10Z" + }, { "name": "CVE-2025-24813-Scanner", "full_name": "issamjr/CVE-2025-24813-Scanner", @@ -161,15 +170,6 @@ "forks_count": 1, "created_at": "2025-03-17T22:39:38Z" }, - { - "name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE", - "full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", - "html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", - "description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.", - "stargazers_count": 2, - "forks_count": 0, - "created_at": "2025-04-12T17:38:02Z" - }, { "name": "CVE-2025-24813", "full_name": "gregk4sec/CVE-2025-24813", @@ -206,15 +206,6 @@ "forks_count": 0, "created_at": "2025-05-11T19:50:11Z" }, - { - "name": "CVE-2025-24813", - "full_name": "x1ongsec/CVE-2025-24813", - "html_url": "https://github.com/x1ongsec/CVE-2025-24813", - "description": "tomcat CVE-2025-24813 反序列化RCE环境", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-06-21T14:20:44Z" - }, { "name": "CVE-2025-24813", "full_name": "manjula-aw/CVE-2025-24813", @@ -224,6 +215,15 @@ "forks_count": 0, "created_at": "2025-03-30T09:39:45Z" }, + { + "name": "CVE-2025-24813", + "full_name": "GongWook/CVE-2025-24813", + "html_url": "https://github.com/GongWook/CVE-2025-24813", + "description": "POC", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-07-07T07:17:31Z" + }, { "name": "CVE-2025-24813", "full_name": "Eduardo-hardvester/CVE-2025-24813", @@ -233,6 +233,15 @@ "forks_count": 0, "created_at": "2025-05-10T15:58:12Z" }, + { + "name": "CVE-2025-24813", + "full_name": "x1ongsec/CVE-2025-24813", + "html_url": "https://github.com/x1ongsec/CVE-2025-24813", + "description": "tomcat CVE-2025-24813 反序列化RCE环境", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-06-21T14:20:44Z" + }, { "name": "CVE-2025-24813", "full_name": "hakankarabacak/CVE-2025-24813", @@ -242,6 +251,15 @@ "forks_count": 0, "created_at": "2025-04-27T13:50:24Z" }, + { + "name": "lab-cve-2025-24813", + "full_name": "ps-interactive/lab-cve-2025-24813", + "html_url": "https://github.com/ps-interactive/lab-cve-2025-24813", + "description": "Resources for teh Apache Tomcat CVE lab", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-03-19T19:55:02Z" + }, { "name": "Tomcat-CVE-2025-24813", "full_name": "B1gN0Se/Tomcat-CVE-2025-24813", @@ -250,23 +268,5 @@ "stargazers_count": 0, "forks_count": 0, "created_at": "2025-03-31T19:01:28Z" - }, - { - "name": "CVE-2025-24813-checker", - "full_name": "horsehacks/CVE-2025-24813-checker", - "html_url": "https://github.com/horsehacks/CVE-2025-24813-checker", - "description": "Hello researchers, I have a checker for the recent vulnerability CVE-2025-24813-checker.", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-04-07T22:43:56Z" - }, - { - "name": "CVE-2025-24813-POC", - "full_name": "f8l124/CVE-2025-24813-POC", - "html_url": "https://github.com/f8l124/CVE-2025-24813-POC", - "description": "A simple, easy-to-use POC for CVE-2025-42813 (Apache Tomcat versions below 9.0.99).", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-04-09T15:20:32Z" } ] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-24813.json b/exploits/2025/CVE-2025-24813.json index 5b09a5a..0177a0b 100644 --- a/exploits/2025/CVE-2025-24813.json +++ b/exploits/2025/CVE-2025-24813.json @@ -4,7 +4,7 @@ "full_name": "absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", - "stargazers_count": 142, + "stargazers_count": 146, "forks_count": 35, "created_at": "2025-03-14T07:36:58Z" }, @@ -14,7 +14,7 @@ "html_url": "https://github.com/iSee857/CVE-2025-24813-PoC", "description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)", "stargazers_count": 86, - "forks_count": 25, + "forks_count": 26, "created_at": "2025-03-13T10:00:03Z" }, { @@ -26,6 +26,15 @@ "forks_count": 8, "created_at": "2025-04-05T18:57:08Z" }, + { + "name": "Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-", + "full_name": "mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-", + "html_url": "https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-", + "description": "Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)", + "stargazers_count": 12, + "forks_count": 2, + "created_at": "2025-05-25T13:34:18Z" + }, { "name": "cve-2025-24813_poc", "full_name": "FY036/cve-2025-24813_poc", @@ -44,15 +53,6 @@ "forks_count": 0, "created_at": "2025-03-16T11:59:59Z" }, - { - "name": "Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-", - "full_name": "mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-", - "html_url": "https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-", - "description": "Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)", - "stargazers_count": 8, - "forks_count": 2, - "created_at": "2025-05-25T13:34:18Z" - }, { "name": "Poc_for_CVE-2025-24813", "full_name": "Franconyu/Poc_for_CVE-2025-24813", @@ -116,6 +116,15 @@ "forks_count": 0, "created_at": "2025-03-14T03:11:40Z" }, + { + "name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.", + "stargazers_count": 3, + "forks_count": 0, + "created_at": "2025-04-12T17:38:02Z" + }, { "name": "CVE-2025-24813", "full_name": "beyond-devsecops/CVE-2025-24813", @@ -161,15 +170,6 @@ "forks_count": 1, "created_at": "2025-03-17T22:39:38Z" }, - { - "name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE", - "full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", - "html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", - "description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.", - "stargazers_count": 2, - "forks_count": 0, - "created_at": "2025-04-12T17:38:02Z" - }, { "name": "CVE-2025-24813", "full_name": "gregk4sec/CVE-2025-24813", @@ -206,6 +206,15 @@ "forks_count": 0, "created_at": "2025-05-11T19:50:11Z" }, + { + "name": "CVE-2025-24813", + "full_name": "Eduardo-hardvester/CVE-2025-24813", + "html_url": "https://github.com/Eduardo-hardvester/CVE-2025-24813", + "description": "Remote Code Execution (RCE) vulnerability in Apache Tomcat.", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-05-10T15:58:12Z" + }, { "name": "CVE-2025-24813", "full_name": "hakankarabacak/CVE-2025-24813", @@ -224,15 +233,6 @@ "forks_count": 0, "created_at": "2025-06-21T14:20:44Z" }, - { - "name": "CVE-2025-24813", - "full_name": "Eduardo-hardvester/CVE-2025-24813", - "html_url": "https://github.com/Eduardo-hardvester/CVE-2025-24813", - "description": "Remote Code Execution (RCE) vulnerability in Apache Tomcat.", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-05-10T15:58:12Z" - }, { "name": "CVE-2025-24813", "full_name": "manjula-aw/CVE-2025-24813", @@ -242,6 +242,15 @@ "forks_count": 0, "created_at": "2025-03-30T09:39:45Z" }, + { + "name": "CVE-2025-24813", + "full_name": "GongWook/CVE-2025-24813", + "html_url": "https://github.com/GongWook/CVE-2025-24813", + "description": "POC", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-07-07T07:17:31Z" + }, { "name": "CVE-2025-24813-checker", "full_name": "horsehacks/CVE-2025-24813-checker", @@ -259,14 +268,5 @@ "stargazers_count": 0, "forks_count": 0, "created_at": "2025-03-31T19:01:28Z" - }, - { - "name": "CVE-2025-24813-POC", - "full_name": "La3B0z/CVE-2025-24813-POC", - "html_url": "https://github.com/La3B0z/CVE-2025-24813-POC", - "description": " CVE-2025-24813-POC JSP Web Shell Uploader", - "stargazers_count": 0, - "forks_count": 1, - "created_at": "2025-04-06T19:36:48Z" } ] \ No newline at end of file