Update recent feed data
This commit is contained in:
parent
58ce4e6181
commit
7d1e9261f9
10 changed files with 206 additions and 128 deletions
|
@ -4,7 +4,7 @@
|
|||
"full_name": "hfiref0x/CVE-2015-1701",
|
||||
"html_url": "https://github.com/hfiref0x/CVE-2015-1701",
|
||||
"description": "Win32k LPE vulnerability used in APT attack",
|
||||
"stargazers_count": 287,
|
||||
"stargazers_count": 288,
|
||||
"forks_count": 176,
|
||||
"created_at": "2015-05-12T18:04:48Z"
|
||||
},
|
||||
|
|
|
@ -4,8 +4,8 @@
|
|||
"full_name": "duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC",
|
||||
"html_url": "https://github.com/duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC",
|
||||
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
|
||||
"stargazers_count": 271,
|
||||
"forks_count": 40,
|
||||
"stargazers_count": 270,
|
||||
"forks_count": 39,
|
||||
"created_at": "2023-02-02T15:34:28Z"
|
||||
},
|
||||
{
|
||||
|
@ -13,7 +13,7 @@
|
|||
"full_name": "voidz0r/CVE-2022-44268",
|
||||
"html_url": "https://github.com/voidz0r/CVE-2022-44268",
|
||||
"description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read",
|
||||
"stargazers_count": 215,
|
||||
"stargazers_count": 216,
|
||||
"forks_count": 25,
|
||||
"created_at": "2023-02-05T18:42:27Z"
|
||||
},
|
||||
|
@ -152,15 +152,6 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2023-11-14T21:54:17Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2022-44268",
|
||||
"full_name": "Pog-Frog/cve-2022-44268",
|
||||
"html_url": "https://github.com/Pog-Frog/cve-2022-44268",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2023-07-14T17:46:15Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2022-44268",
|
||||
"full_name": "FlojBoj/CVE-2022-44268",
|
||||
|
@ -170,6 +161,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2024-09-02T09:11:45Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2022-44268",
|
||||
"full_name": "Pog-Frog/cve-2022-44268",
|
||||
"html_url": "https://github.com/Pog-Frog/cve-2022-44268",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2023-07-14T17:46:15Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2022-44268-pilgrimage",
|
||||
"full_name": "katseyres2/CVE-2022-44268-pilgrimage",
|
||||
|
@ -180,13 +180,13 @@
|
|||
"created_at": "2025-05-02T21:31:39Z"
|
||||
},
|
||||
{
|
||||
"name": "heroku-CVE-2022-44268-reproduction",
|
||||
"full_name": "nfm/heroku-CVE-2022-44268-reproduction",
|
||||
"html_url": "https://github.com/nfm/heroku-CVE-2022-44268-reproduction",
|
||||
"description": null,
|
||||
"name": "Automate_Exploit_CVE-2022-44268",
|
||||
"full_name": "J0ey17/Automate_Exploit_CVE-2022-44268",
|
||||
"html_url": "https://github.com/J0ey17/Automate_Exploit_CVE-2022-44268",
|
||||
"description": "An exploit automation script that builds upon the work of Voidzone security.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-02-21T01:15:07Z"
|
||||
"created_at": "2025-06-04T20:06:08Z"
|
||||
},
|
||||
{
|
||||
"name": "IMAGE-MAGICK-CVE-2022-44268",
|
||||
|
@ -206,6 +206,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2023-02-04T03:50:07Z"
|
||||
},
|
||||
{
|
||||
"name": "heroku-CVE-2022-44268-reproduction",
|
||||
"full_name": "nfm/heroku-CVE-2022-44268-reproduction",
|
||||
"html_url": "https://github.com/nfm/heroku-CVE-2022-44268-reproduction",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-02-21T01:15:07Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2022-44268-fixed-PoC",
|
||||
"full_name": "CygnusX-26/CVE-2022-44268-fixed-PoC",
|
||||
|
|
38
exploits/2023/CVE-2023-3777.json
Normal file
38
exploits/2023/CVE-2023-3777.json
Normal file
|
@ -0,0 +1,38 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2023-37779",
|
||||
"full_name": "jyoti818680/CVE-2023-37779",
|
||||
"html_url": "https://github.com/jyoti818680/CVE-2023-37779",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2023-07-28T13:07:45Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2023-37778",
|
||||
"full_name": "jyoti818680/CVE-2023-37778",
|
||||
"html_url": "https://github.com/jyoti818680/CVE-2023-37778",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-07-28T11:18:21Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2023-37771",
|
||||
"full_name": "anky-123/CVE-2023-37771",
|
||||
"html_url": "https://github.com/anky-123/CVE-2023-37771",
|
||||
"description": "CVE",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2023-07-19T14:51:04Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2023-37772",
|
||||
"full_name": "anky-123/CVE-2023-37772",
|
||||
"html_url": "https://github.com/anky-123/CVE-2023-37772",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2023-07-27T18:48:10Z"
|
||||
}
|
||||
]
|
20
exploits/2023/CVE-2023-3889.json
Normal file
20
exploits/2023/CVE-2023-3889.json
Normal file
|
@ -0,0 +1,20 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2023-38891",
|
||||
"full_name": "jselliott/CVE-2023-38891",
|
||||
"html_url": "https://github.com/jselliott/CVE-2023-38891",
|
||||
"description": "Authenticated SQL Injection Vulnerability in VTiger Open Source CRM v7.5",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 1,
|
||||
"created_at": "2023-09-12T22:58:41Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2023-38890",
|
||||
"full_name": "akshadjoshi/CVE-2023-38890",
|
||||
"html_url": "https://github.com/akshadjoshi/CVE-2023-38890",
|
||||
"description": "poc",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-08-18T16:37:39Z"
|
||||
}
|
||||
]
|
11
exploits/2024/CVE-2024-11042.json
Normal file
11
exploits/2024/CVE-2024-11042.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-11042",
|
||||
"full_name": "gothburz/CVE-2024-11042",
|
||||
"html_url": "https://github.com/gothburz/CVE-2024-11042",
|
||||
"description": "Proof-of-concept for In invoke-ai/invokeai version v5.0.2 Arbitrary File Deletion.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-21T16:55:49Z"
|
||||
}
|
||||
]
|
|
@ -1,13 +1,4 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2024-55968",
|
||||
"full_name": "null-event/CVE-2024-55968",
|
||||
"html_url": "https://github.com/null-event/CVE-2024-55968",
|
||||
"description": "POC for DTEX LPE (CVE-2024-55968)",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-12-17T21:08:11Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-55968",
|
||||
"full_name": "Wi1DN00B/CVE-2024-55968",
|
||||
|
@ -16,5 +7,14 @@
|
|||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-12-17T21:07:59Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2024-55968",
|
||||
"full_name": "null-event/CVE-2024-55968",
|
||||
"html_url": "https://github.com/null-event/CVE-2024-55968",
|
||||
"description": "POC for DTEX LPE (CVE-2024-55968)",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-12-17T21:08:11Z"
|
||||
}
|
||||
]
|
|
@ -4,7 +4,7 @@
|
|||
"full_name": "UnionTech-Software/libtheora-CVE-2024-56431-PoC",
|
||||
"html_url": "https://github.com/UnionTech-Software/libtheora-CVE-2024-56431-PoC",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-12-25T03:58:50Z"
|
||||
}
|
||||
|
|
|
@ -4,8 +4,8 @@
|
|||
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
||||
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
||||
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
||||
"stargazers_count": 116,
|
||||
"forks_count": 31,
|
||||
"stargazers_count": 134,
|
||||
"forks_count": 33,
|
||||
"created_at": "2025-03-14T07:36:58Z"
|
||||
},
|
||||
{
|
||||
|
@ -13,7 +13,7 @@
|
|||
"full_name": "iSee857/CVE-2025-24813-PoC",
|
||||
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
|
||||
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
|
||||
"stargazers_count": 84,
|
||||
"stargazers_count": 85,
|
||||
"forks_count": 25,
|
||||
"created_at": "2025-03-13T10:00:03Z"
|
||||
},
|
||||
|
@ -23,7 +23,7 @@
|
|||
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813",
|
||||
"description": null,
|
||||
"stargazers_count": 30,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"created_at": "2025-04-05T18:57:08Z"
|
||||
},
|
||||
{
|
||||
|
@ -53,6 +53,15 @@
|
|||
"forks_count": 3,
|
||||
"created_at": "2025-04-10T14:49:14Z"
|
||||
},
|
||||
{
|
||||
"name": "Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
|
||||
"full_name": "mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
|
||||
"html_url": "https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
|
||||
"description": "Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)",
|
||||
"stargazers_count": 7,
|
||||
"forks_count": 2,
|
||||
"created_at": "2025-05-25T13:34:18Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Exploit",
|
||||
"full_name": "msadeghkarimi/CVE-2025-24813-Exploit",
|
||||
|
@ -80,6 +89,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-04-05T09:07:13Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Scanner",
|
||||
"full_name": "Mattb709/CVE-2025-24813-Scanner",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
|
||||
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
|
||||
"stargazers_count": 4,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T19:12:39Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813_POC",
|
||||
"full_name": "N0c1or/CVE-2025-24813_POC",
|
||||
|
@ -89,6 +107,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-14T03:11:40Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "AlperenY-cs/CVE-2025-24813",
|
||||
"html_url": "https://github.com/AlperenY-cs/CVE-2025-24813",
|
||||
"description": " Create lab for CVE-2025-24813",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-28T09:44:28Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "beyond-devsecops/CVE-2025-24813",
|
||||
|
@ -121,19 +148,10 @@
|
|||
"full_name": "Alaatk/CVE-2025-24813-POC",
|
||||
"html_url": "https://github.com/Alaatk/CVE-2025-24813-POC",
|
||||
"description": "CVE-2025-24813 Apache Tomcat RCE Proof of Concept (PoC)",
|
||||
"stargazers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-21T18:05:27Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Scanner",
|
||||
"full_name": "Mattb709/CVE-2025-24813-Scanner",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
|
||||
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T19:12:39Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-apache-tomcat",
|
||||
"full_name": "imbas007/CVE-2025-24813-apache-tomcat",
|
||||
|
@ -144,13 +162,13 @@
|
|||
"created_at": "2025-03-17T22:39:38Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "AlperenY-cs/CVE-2025-24813",
|
||||
"html_url": "https://github.com/AlperenY-cs/CVE-2025-24813",
|
||||
"description": " Create lab for CVE-2025-24813",
|
||||
"stargazers_count": 1,
|
||||
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-28T09:44:28Z"
|
||||
"created_at": "2025-04-12T17:38:02Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
|
@ -179,24 +197,6 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-22T15:16:41Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T17:38:02Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "Eduardo-hardvester/CVE-2025-24813",
|
||||
"html_url": "https://github.com/Eduardo-hardvester/CVE-2025-24813",
|
||||
"description": "Remote Code Execution (RCE) vulnerability in Apache Tomcat.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-05-10T15:58:12Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "fatkz/CVE-2025-24813",
|
||||
|
@ -215,6 +215,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-30T09:39:45Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "Eduardo-hardvester/CVE-2025-24813",
|
||||
"html_url": "https://github.com/Eduardo-hardvester/CVE-2025-24813",
|
||||
"description": "Remote Code Execution (RCE) vulnerability in Apache Tomcat.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-05-10T15:58:12Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "hakankarabacak/CVE-2025-24813",
|
||||
|
@ -251,15 +260,6 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-04-07T22:43:56Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-POC",
|
||||
"full_name": "f8l124/CVE-2025-24813-POC",
|
||||
"html_url": "https://github.com/f8l124/CVE-2025-24813-POC",
|
||||
"description": "A simple, easy-to-use POC for CVE-2025-42813 (Apache Tomcat versions below 9.0.99).",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-09T15:20:32Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-POC",
|
||||
"full_name": "La3B0z/CVE-2025-24813-POC",
|
||||
|
|
|
@ -4,8 +4,8 @@
|
|||
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
||||
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
||||
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
||||
"stargazers_count": 116,
|
||||
"forks_count": 31,
|
||||
"stargazers_count": 134,
|
||||
"forks_count": 33,
|
||||
"created_at": "2025-03-14T07:36:58Z"
|
||||
},
|
||||
{
|
||||
|
@ -13,7 +13,7 @@
|
|||
"full_name": "iSee857/CVE-2025-24813-PoC",
|
||||
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
|
||||
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
|
||||
"stargazers_count": 84,
|
||||
"stargazers_count": 85,
|
||||
"forks_count": 25,
|
||||
"created_at": "2025-03-13T10:00:03Z"
|
||||
},
|
||||
|
@ -23,7 +23,7 @@
|
|||
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813",
|
||||
"description": null,
|
||||
"stargazers_count": 30,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"created_at": "2025-04-05T18:57:08Z"
|
||||
},
|
||||
{
|
||||
|
@ -53,6 +53,15 @@
|
|||
"forks_count": 3,
|
||||
"created_at": "2025-04-10T14:49:14Z"
|
||||
},
|
||||
{
|
||||
"name": "Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
|
||||
"full_name": "mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
|
||||
"html_url": "https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-",
|
||||
"description": "Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)",
|
||||
"stargazers_count": 7,
|
||||
"forks_count": 2,
|
||||
"created_at": "2025-05-25T13:34:18Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Exploit",
|
||||
"full_name": "msadeghkarimi/CVE-2025-24813-Exploit",
|
||||
|
@ -80,6 +89,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-04-05T09:07:13Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Scanner",
|
||||
"full_name": "Mattb709/CVE-2025-24813-Scanner",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
|
||||
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
|
||||
"stargazers_count": 4,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T19:12:39Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813_POC",
|
||||
"full_name": "N0c1or/CVE-2025-24813_POC",
|
||||
|
@ -89,6 +107,15 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-14T03:11:40Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "AlperenY-cs/CVE-2025-24813",
|
||||
"html_url": "https://github.com/AlperenY-cs/CVE-2025-24813",
|
||||
"description": " Create lab for CVE-2025-24813",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-28T09:44:28Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "beyond-devsecops/CVE-2025-24813",
|
||||
|
@ -112,19 +139,10 @@
|
|||
"full_name": "Alaatk/CVE-2025-24813-POC",
|
||||
"html_url": "https://github.com/Alaatk/CVE-2025-24813-POC",
|
||||
"description": "CVE-2025-24813 Apache Tomcat RCE Proof of Concept (PoC)",
|
||||
"stargazers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-21T18:05:27Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Scanner",
|
||||
"full_name": "Mattb709/CVE-2025-24813-Scanner",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
|
||||
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T19:12:39Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Scanner",
|
||||
"full_name": "issamjr/CVE-2025-24813-Scanner",
|
||||
|
@ -143,6 +161,15 @@
|
|||
"forks_count": 1,
|
||||
"created_at": "2025-03-17T22:39:38Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T17:38:02Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "gregk4sec/CVE-2025-24813",
|
||||
|
@ -152,15 +179,6 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-14T05:39:33Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "AlperenY-cs/CVE-2025-24813",
|
||||
"html_url": "https://github.com/AlperenY-cs/CVE-2025-24813",
|
||||
"description": " Create lab for CVE-2025-24813",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-28T09:44:28Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "GadaLuBau1337/CVE-2025-24813",
|
||||
|
@ -180,13 +198,13 @@
|
|||
"created_at": "2025-03-22T15:16:41Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
|
||||
"stargazers_count": 1,
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "fatkz/CVE-2025-24813",
|
||||
"html_url": "https://github.com/fatkz/CVE-2025-24813",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T17:38:02Z"
|
||||
"created_at": "2025-05-11T19:50:11Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
|
@ -199,12 +217,12 @@
|
|||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "fatkz/CVE-2025-24813",
|
||||
"html_url": "https://github.com/fatkz/CVE-2025-24813",
|
||||
"description": null,
|
||||
"full_name": "hakankarabacak/CVE-2025-24813",
|
||||
"html_url": "https://github.com/hakankarabacak/CVE-2025-24813",
|
||||
"description": "Proof of Concept (PoC) script for CVE-2025-24813, vulnerability in Apache Tomcat.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-05-11T19:50:11Z"
|
||||
"created_at": "2025-04-27T13:50:24Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
|
@ -215,15 +233,6 @@
|
|||
"forks_count": 0,
|
||||
"created_at": "2025-03-30T09:39:45Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "hakankarabacak/CVE-2025-24813",
|
||||
"html_url": "https://github.com/hakankarabacak/CVE-2025-24813",
|
||||
"description": "Proof of Concept (PoC) script for CVE-2025-24813, vulnerability in Apache Tomcat.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-27T13:50:24Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-checker",
|
||||
"full_name": "horsehacks/CVE-2025-24813-checker",
|
||||
|
@ -259,14 +268,5 @@
|
|||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2025-04-06T19:36:48Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-POC",
|
||||
"full_name": "f8l124/CVE-2025-24813-POC",
|
||||
"html_url": "https://github.com/f8l124/CVE-2025-24813-POC",
|
||||
"description": "A simple, easy-to-use POC for CVE-2025-42813 (Apache Tomcat versions below 9.0.99).",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-09T15:20:32Z"
|
||||
}
|
||||
]
|
|
@ -4,8 +4,8 @@
|
|||
"full_name": "Alchemist3dot14/CVE-2025-2783",
|
||||
"html_url": "https://github.com/Alchemist3dot14/CVE-2025-2783",
|
||||
"description": "Simulated PoC for CVE-2025-2783 — a sandbox escape vulnerability in Chrome's Mojo IPC. Includes phishing delivery, memory fuzzing, IPC simulation, and logging. Safe for red team demos, detection engineering, and educational use.",
|
||||
"stargazers_count": 10,
|
||||
"forks_count": 1,
|
||||
"stargazers_count": 17,
|
||||
"forks_count": 2,
|
||||
"created_at": "2025-04-06T03:49:01Z"
|
||||
}
|
||||
]
|
Loading…
Add table
Reference in a new issue