From 7d1e9261f956709bdb2151bc315b404f6c4d6430 Mon Sep 17 00:00:00 2001 From: bpmcdevitt Date: Sat, 7 Jun 2025 17:54:06 +0000 Subject: [PATCH] Update recent feed data --- exploits/2015/CVE-2015-1701.json | 2 +- exploits/2022/CVE-2022-44268.json | 43 ++++++++----- exploits/2023/CVE-2023-3777.json | 38 +++++++++++ exploits/2023/CVE-2023-3889.json | 20 ++++++ exploits/2024/CVE-2024-11042.json | 11 ++++ exploits/2024/CVE-2024-55968.json | 18 +++--- exploits/2024/CVE-2024-56431.json | 2 +- exploits/2025/CVE-2025-2481.json | 94 +++++++++++++-------------- exploits/2025/CVE-2025-24813.json | 102 +++++++++++++++--------------- exploits/2025/CVE-2025-2783.json | 4 +- 10 files changed, 206 insertions(+), 128 deletions(-) create mode 100644 exploits/2023/CVE-2023-3777.json create mode 100644 exploits/2023/CVE-2023-3889.json create mode 100644 exploits/2024/CVE-2024-11042.json diff --git a/exploits/2015/CVE-2015-1701.json b/exploits/2015/CVE-2015-1701.json index 5a7ecea..9e77598 100644 --- a/exploits/2015/CVE-2015-1701.json +++ b/exploits/2015/CVE-2015-1701.json @@ -4,7 +4,7 @@ "full_name": "hfiref0x/CVE-2015-1701", "html_url": "https://github.com/hfiref0x/CVE-2015-1701", "description": "Win32k LPE vulnerability used in APT attack", - "stargazers_count": 287, + "stargazers_count": 288, "forks_count": 176, "created_at": "2015-05-12T18:04:48Z" }, diff --git a/exploits/2022/CVE-2022-44268.json b/exploits/2022/CVE-2022-44268.json index 5d043ee..ef922f2 100644 --- a/exploits/2022/CVE-2022-44268.json +++ b/exploits/2022/CVE-2022-44268.json @@ -4,8 +4,8 @@ "full_name": "duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC", "html_url": "https://github.com/duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC", "description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator", - "stargazers_count": 271, - "forks_count": 40, + "stargazers_count": 270, + "forks_count": 39, "created_at": "2023-02-02T15:34:28Z" }, { @@ -13,7 +13,7 @@ "full_name": "voidz0r/CVE-2022-44268", "html_url": "https://github.com/voidz0r/CVE-2022-44268", "description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read", - "stargazers_count": 215, + "stargazers_count": 216, "forks_count": 25, "created_at": "2023-02-05T18:42:27Z" }, @@ -152,15 +152,6 @@ "forks_count": 0, "created_at": "2023-11-14T21:54:17Z" }, - { - "name": "cve-2022-44268", - "full_name": "Pog-Frog/cve-2022-44268", - "html_url": "https://github.com/Pog-Frog/cve-2022-44268", - "description": null, - "stargazers_count": 0, - "forks_count": 1, - "created_at": "2023-07-14T17:46:15Z" - }, { "name": "CVE-2022-44268", "full_name": "FlojBoj/CVE-2022-44268", @@ -170,6 +161,15 @@ "forks_count": 0, "created_at": "2024-09-02T09:11:45Z" }, + { + "name": "cve-2022-44268", + "full_name": "Pog-Frog/cve-2022-44268", + "html_url": "https://github.com/Pog-Frog/cve-2022-44268", + "description": null, + "stargazers_count": 0, + "forks_count": 1, + "created_at": "2023-07-14T17:46:15Z" + }, { "name": "CVE-2022-44268-pilgrimage", "full_name": "katseyres2/CVE-2022-44268-pilgrimage", @@ -180,13 +180,13 @@ "created_at": "2025-05-02T21:31:39Z" }, { - "name": "heroku-CVE-2022-44268-reproduction", - "full_name": "nfm/heroku-CVE-2022-44268-reproduction", - "html_url": "https://github.com/nfm/heroku-CVE-2022-44268-reproduction", - "description": null, + "name": "Automate_Exploit_CVE-2022-44268", + "full_name": "J0ey17/Automate_Exploit_CVE-2022-44268", + "html_url": "https://github.com/J0ey17/Automate_Exploit_CVE-2022-44268", + "description": "An exploit automation script that builds upon the work of Voidzone security.", "stargazers_count": 0, "forks_count": 0, - "created_at": "2023-02-21T01:15:07Z" + "created_at": "2025-06-04T20:06:08Z" }, { "name": "IMAGE-MAGICK-CVE-2022-44268", @@ -206,6 +206,15 @@ "forks_count": 0, "created_at": "2023-02-04T03:50:07Z" }, + { + "name": "heroku-CVE-2022-44268-reproduction", + "full_name": "nfm/heroku-CVE-2022-44268-reproduction", + "html_url": "https://github.com/nfm/heroku-CVE-2022-44268-reproduction", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-02-21T01:15:07Z" + }, { "name": "CVE-2022-44268-fixed-PoC", "full_name": "CygnusX-26/CVE-2022-44268-fixed-PoC", diff --git a/exploits/2023/CVE-2023-3777.json b/exploits/2023/CVE-2023-3777.json new file mode 100644 index 0000000..333b97a --- /dev/null +++ b/exploits/2023/CVE-2023-3777.json @@ -0,0 +1,38 @@ +[ + { + "name": "CVE-2023-37779", + "full_name": "jyoti818680/CVE-2023-37779", + "html_url": "https://github.com/jyoti818680/CVE-2023-37779", + "description": null, + "stargazers_count": 0, + "forks_count": 1, + "created_at": "2023-07-28T13:07:45Z" + }, + { + "name": "CVE-2023-37778", + "full_name": "jyoti818680/CVE-2023-37778", + "html_url": "https://github.com/jyoti818680/CVE-2023-37778", + "description": null, + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-07-28T11:18:21Z" + }, + { + "name": "CVE-2023-37771", + "full_name": "anky-123/CVE-2023-37771", + "html_url": "https://github.com/anky-123/CVE-2023-37771", + "description": "CVE", + "stargazers_count": 0, + "forks_count": 1, + "created_at": "2023-07-19T14:51:04Z" + }, + { + "name": "CVE-2023-37772", + "full_name": "anky-123/CVE-2023-37772", + "html_url": "https://github.com/anky-123/CVE-2023-37772", + "description": null, + "stargazers_count": 0, + "forks_count": 1, + "created_at": "2023-07-27T18:48:10Z" + } +] \ No newline at end of file diff --git a/exploits/2023/CVE-2023-3889.json b/exploits/2023/CVE-2023-3889.json new file mode 100644 index 0000000..b17515c --- /dev/null +++ b/exploits/2023/CVE-2023-3889.json @@ -0,0 +1,20 @@ +[ + { + "name": "CVE-2023-38891", + "full_name": "jselliott/CVE-2023-38891", + "html_url": "https://github.com/jselliott/CVE-2023-38891", + "description": "Authenticated SQL Injection Vulnerability in VTiger Open Source CRM v7.5", + "stargazers_count": 1, + "forks_count": 1, + "created_at": "2023-09-12T22:58:41Z" + }, + { + "name": "CVE-2023-38890", + "full_name": "akshadjoshi/CVE-2023-38890", + "html_url": "https://github.com/akshadjoshi/CVE-2023-38890", + "description": "poc", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2023-08-18T16:37:39Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-11042.json b/exploits/2024/CVE-2024-11042.json new file mode 100644 index 0000000..4e86a4d --- /dev/null +++ b/exploits/2024/CVE-2024-11042.json @@ -0,0 +1,11 @@ +[ + { + "name": "CVE-2024-11042", + "full_name": "gothburz/CVE-2024-11042", + "html_url": "https://github.com/gothburz/CVE-2024-11042", + "description": "Proof-of-concept for In invoke-ai/invokeai version v5.0.2 Arbitrary File Deletion.", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-03-21T16:55:49Z" + } +] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-55968.json b/exploits/2024/CVE-2024-55968.json index 66627aa..8eb3313 100644 --- a/exploits/2024/CVE-2024-55968.json +++ b/exploits/2024/CVE-2024-55968.json @@ -1,13 +1,4 @@ [ - { - "name": "CVE-2024-55968", - "full_name": "null-event/CVE-2024-55968", - "html_url": "https://github.com/null-event/CVE-2024-55968", - "description": "POC for DTEX LPE (CVE-2024-55968)", - "stargazers_count": 2, - "forks_count": 0, - "created_at": "2024-12-17T21:08:11Z" - }, { "name": "CVE-2024-55968", "full_name": "Wi1DN00B/CVE-2024-55968", @@ -16,5 +7,14 @@ "stargazers_count": 2, "forks_count": 0, "created_at": "2024-12-17T21:07:59Z" + }, + { + "name": "CVE-2024-55968", + "full_name": "null-event/CVE-2024-55968", + "html_url": "https://github.com/null-event/CVE-2024-55968", + "description": "POC for DTEX LPE (CVE-2024-55968)", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2024-12-17T21:08:11Z" } ] \ No newline at end of file diff --git a/exploits/2024/CVE-2024-56431.json b/exploits/2024/CVE-2024-56431.json index dd51b4e..1bb0967 100644 --- a/exploits/2024/CVE-2024-56431.json +++ b/exploits/2024/CVE-2024-56431.json @@ -4,7 +4,7 @@ "full_name": "UnionTech-Software/libtheora-CVE-2024-56431-PoC", "html_url": "https://github.com/UnionTech-Software/libtheora-CVE-2024-56431-PoC", "description": null, - "stargazers_count": 0, + "stargazers_count": 1, "forks_count": 0, "created_at": "2024-12-25T03:58:50Z" } diff --git a/exploits/2025/CVE-2025-2481.json b/exploits/2025/CVE-2025-2481.json index f444d7d..0875330 100644 --- a/exploits/2025/CVE-2025-2481.json +++ b/exploits/2025/CVE-2025-2481.json @@ -4,8 +4,8 @@ "full_name": "absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", - "stargazers_count": 116, - "forks_count": 31, + "stargazers_count": 134, + "forks_count": 33, "created_at": "2025-03-14T07:36:58Z" }, { @@ -13,7 +13,7 @@ "full_name": "iSee857/CVE-2025-24813-PoC", "html_url": "https://github.com/iSee857/CVE-2025-24813-PoC", "description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)", - "stargazers_count": 84, + "stargazers_count": 85, "forks_count": 25, "created_at": "2025-03-13T10:00:03Z" }, @@ -23,7 +23,7 @@ "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813", "description": null, "stargazers_count": 30, - "forks_count": 6, + "forks_count": 7, "created_at": "2025-04-05T18:57:08Z" }, { @@ -53,6 +53,15 @@ "forks_count": 3, "created_at": "2025-04-10T14:49:14Z" }, + { + "name": "Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-", + "full_name": "mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-", + "html_url": "https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-", + "description": "Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)", + "stargazers_count": 7, + "forks_count": 2, + "created_at": "2025-05-25T13:34:18Z" + }, { "name": "CVE-2025-24813-Exploit", "full_name": "msadeghkarimi/CVE-2025-24813-Exploit", @@ -80,6 +89,15 @@ "forks_count": 0, "created_at": "2025-04-05T09:07:13Z" }, + { + "name": "CVE-2025-24813-Scanner", + "full_name": "Mattb709/CVE-2025-24813-Scanner", + "html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner", + "description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.", + "stargazers_count": 4, + "forks_count": 0, + "created_at": "2025-04-12T19:12:39Z" + }, { "name": "CVE-2025-24813_POC", "full_name": "N0c1or/CVE-2025-24813_POC", @@ -89,6 +107,15 @@ "forks_count": 0, "created_at": "2025-03-14T03:11:40Z" }, + { + "name": "CVE-2025-24813", + "full_name": "AlperenY-cs/CVE-2025-24813", + "html_url": "https://github.com/AlperenY-cs/CVE-2025-24813", + "description": " Create lab for CVE-2025-24813", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2025-03-28T09:44:28Z" + }, { "name": "CVE-2025-24813", "full_name": "beyond-devsecops/CVE-2025-24813", @@ -121,19 +148,10 @@ "full_name": "Alaatk/CVE-2025-24813-POC", "html_url": "https://github.com/Alaatk/CVE-2025-24813-POC", "description": "CVE-2025-24813 Apache Tomcat RCE Proof of Concept (PoC)", - "stargazers_count": 2, + "stargazers_count": 3, "forks_count": 0, "created_at": "2025-03-21T18:05:27Z" }, - { - "name": "CVE-2025-24813-Scanner", - "full_name": "Mattb709/CVE-2025-24813-Scanner", - "html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner", - "description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.", - "stargazers_count": 2, - "forks_count": 0, - "created_at": "2025-04-12T19:12:39Z" - }, { "name": "CVE-2025-24813-apache-tomcat", "full_name": "imbas007/CVE-2025-24813-apache-tomcat", @@ -144,13 +162,13 @@ "created_at": "2025-03-17T22:39:38Z" }, { - "name": "CVE-2025-24813", - "full_name": "AlperenY-cs/CVE-2025-24813", - "html_url": "https://github.com/AlperenY-cs/CVE-2025-24813", - "description": " Create lab for CVE-2025-24813", - "stargazers_count": 1, + "name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.", + "stargazers_count": 2, "forks_count": 0, - "created_at": "2025-03-28T09:44:28Z" + "created_at": "2025-04-12T17:38:02Z" }, { "name": "CVE-2025-24813", @@ -179,24 +197,6 @@ "forks_count": 0, "created_at": "2025-03-22T15:16:41Z" }, - { - "name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE", - "full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", - "html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", - "description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.", - "stargazers_count": 1, - "forks_count": 0, - "created_at": "2025-04-12T17:38:02Z" - }, - { - "name": "CVE-2025-24813", - "full_name": "Eduardo-hardvester/CVE-2025-24813", - "html_url": "https://github.com/Eduardo-hardvester/CVE-2025-24813", - "description": "Remote Code Execution (RCE) vulnerability in Apache Tomcat.", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-05-10T15:58:12Z" - }, { "name": "CVE-2025-24813", "full_name": "fatkz/CVE-2025-24813", @@ -215,6 +215,15 @@ "forks_count": 0, "created_at": "2025-03-30T09:39:45Z" }, + { + "name": "CVE-2025-24813", + "full_name": "Eduardo-hardvester/CVE-2025-24813", + "html_url": "https://github.com/Eduardo-hardvester/CVE-2025-24813", + "description": "Remote Code Execution (RCE) vulnerability in Apache Tomcat.", + "stargazers_count": 0, + "forks_count": 0, + "created_at": "2025-05-10T15:58:12Z" + }, { "name": "CVE-2025-24813", "full_name": "hakankarabacak/CVE-2025-24813", @@ -251,15 +260,6 @@ "forks_count": 0, "created_at": "2025-04-07T22:43:56Z" }, - { - "name": "CVE-2025-24813-POC", - "full_name": "f8l124/CVE-2025-24813-POC", - "html_url": "https://github.com/f8l124/CVE-2025-24813-POC", - "description": "A simple, easy-to-use POC for CVE-2025-42813 (Apache Tomcat versions below 9.0.99).", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-04-09T15:20:32Z" - }, { "name": "CVE-2025-24813-POC", "full_name": "La3B0z/CVE-2025-24813-POC", diff --git a/exploits/2025/CVE-2025-24813.json b/exploits/2025/CVE-2025-24813.json index a767d7b..49dbe32 100644 --- a/exploits/2025/CVE-2025-24813.json +++ b/exploits/2025/CVE-2025-24813.json @@ -4,8 +4,8 @@ "full_name": "absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", - "stargazers_count": 116, - "forks_count": 31, + "stargazers_count": 134, + "forks_count": 33, "created_at": "2025-03-14T07:36:58Z" }, { @@ -13,7 +13,7 @@ "full_name": "iSee857/CVE-2025-24813-PoC", "html_url": "https://github.com/iSee857/CVE-2025-24813-PoC", "description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)", - "stargazers_count": 84, + "stargazers_count": 85, "forks_count": 25, "created_at": "2025-03-13T10:00:03Z" }, @@ -23,7 +23,7 @@ "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813", "description": null, "stargazers_count": 30, - "forks_count": 6, + "forks_count": 7, "created_at": "2025-04-05T18:57:08Z" }, { @@ -53,6 +53,15 @@ "forks_count": 3, "created_at": "2025-04-10T14:49:14Z" }, + { + "name": "Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-", + "full_name": "mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-", + "html_url": "https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-", + "description": "Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)", + "stargazers_count": 7, + "forks_count": 2, + "created_at": "2025-05-25T13:34:18Z" + }, { "name": "CVE-2025-24813-Exploit", "full_name": "msadeghkarimi/CVE-2025-24813-Exploit", @@ -80,6 +89,15 @@ "forks_count": 0, "created_at": "2025-04-05T09:07:13Z" }, + { + "name": "CVE-2025-24813-Scanner", + "full_name": "Mattb709/CVE-2025-24813-Scanner", + "html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner", + "description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.", + "stargazers_count": 4, + "forks_count": 0, + "created_at": "2025-04-12T19:12:39Z" + }, { "name": "CVE-2025-24813_POC", "full_name": "N0c1or/CVE-2025-24813_POC", @@ -89,6 +107,15 @@ "forks_count": 0, "created_at": "2025-03-14T03:11:40Z" }, + { + "name": "CVE-2025-24813", + "full_name": "AlperenY-cs/CVE-2025-24813", + "html_url": "https://github.com/AlperenY-cs/CVE-2025-24813", + "description": " Create lab for CVE-2025-24813", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2025-03-28T09:44:28Z" + }, { "name": "CVE-2025-24813", "full_name": "beyond-devsecops/CVE-2025-24813", @@ -112,19 +139,10 @@ "full_name": "Alaatk/CVE-2025-24813-POC", "html_url": "https://github.com/Alaatk/CVE-2025-24813-POC", "description": "CVE-2025-24813 Apache Tomcat RCE Proof of Concept (PoC)", - "stargazers_count": 2, + "stargazers_count": 3, "forks_count": 0, "created_at": "2025-03-21T18:05:27Z" }, - { - "name": "CVE-2025-24813-Scanner", - "full_name": "Mattb709/CVE-2025-24813-Scanner", - "html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner", - "description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.", - "stargazers_count": 2, - "forks_count": 0, - "created_at": "2025-04-12T19:12:39Z" - }, { "name": "CVE-2025-24813-Scanner", "full_name": "issamjr/CVE-2025-24813-Scanner", @@ -143,6 +161,15 @@ "forks_count": 1, "created_at": "2025-03-17T22:39:38Z" }, + { + "name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", + "description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.", + "stargazers_count": 2, + "forks_count": 0, + "created_at": "2025-04-12T17:38:02Z" + }, { "name": "CVE-2025-24813", "full_name": "gregk4sec/CVE-2025-24813", @@ -152,15 +179,6 @@ "forks_count": 0, "created_at": "2025-03-14T05:39:33Z" }, - { - "name": "CVE-2025-24813", - "full_name": "AlperenY-cs/CVE-2025-24813", - "html_url": "https://github.com/AlperenY-cs/CVE-2025-24813", - "description": " Create lab for CVE-2025-24813", - "stargazers_count": 1, - "forks_count": 0, - "created_at": "2025-03-28T09:44:28Z" - }, { "name": "CVE-2025-24813", "full_name": "GadaLuBau1337/CVE-2025-24813", @@ -180,13 +198,13 @@ "created_at": "2025-03-22T15:16:41Z" }, { - "name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE", - "full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", - "html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE", - "description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.", - "stargazers_count": 1, + "name": "CVE-2025-24813", + "full_name": "fatkz/CVE-2025-24813", + "html_url": "https://github.com/fatkz/CVE-2025-24813", + "description": null, + "stargazers_count": 0, "forks_count": 0, - "created_at": "2025-04-12T17:38:02Z" + "created_at": "2025-05-11T19:50:11Z" }, { "name": "CVE-2025-24813", @@ -199,12 +217,12 @@ }, { "name": "CVE-2025-24813", - "full_name": "fatkz/CVE-2025-24813", - "html_url": "https://github.com/fatkz/CVE-2025-24813", - "description": null, + "full_name": "hakankarabacak/CVE-2025-24813", + "html_url": "https://github.com/hakankarabacak/CVE-2025-24813", + "description": "Proof of Concept (PoC) script for CVE-2025-24813, vulnerability in Apache Tomcat.", "stargazers_count": 0, "forks_count": 0, - "created_at": "2025-05-11T19:50:11Z" + "created_at": "2025-04-27T13:50:24Z" }, { "name": "CVE-2025-24813", @@ -215,15 +233,6 @@ "forks_count": 0, "created_at": "2025-03-30T09:39:45Z" }, - { - "name": "CVE-2025-24813", - "full_name": "hakankarabacak/CVE-2025-24813", - "html_url": "https://github.com/hakankarabacak/CVE-2025-24813", - "description": "Proof of Concept (PoC) script for CVE-2025-24813, vulnerability in Apache Tomcat.", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-04-27T13:50:24Z" - }, { "name": "CVE-2025-24813-checker", "full_name": "horsehacks/CVE-2025-24813-checker", @@ -259,14 +268,5 @@ "stargazers_count": 0, "forks_count": 1, "created_at": "2025-04-06T19:36:48Z" - }, - { - "name": "CVE-2025-24813-POC", - "full_name": "f8l124/CVE-2025-24813-POC", - "html_url": "https://github.com/f8l124/CVE-2025-24813-POC", - "description": "A simple, easy-to-use POC for CVE-2025-42813 (Apache Tomcat versions below 9.0.99).", - "stargazers_count": 0, - "forks_count": 0, - "created_at": "2025-04-09T15:20:32Z" } ] \ No newline at end of file diff --git a/exploits/2025/CVE-2025-2783.json b/exploits/2025/CVE-2025-2783.json index 37360e2..ef18733 100644 --- a/exploits/2025/CVE-2025-2783.json +++ b/exploits/2025/CVE-2025-2783.json @@ -4,8 +4,8 @@ "full_name": "Alchemist3dot14/CVE-2025-2783", "html_url": "https://github.com/Alchemist3dot14/CVE-2025-2783", "description": "Simulated PoC for CVE-2025-2783 — a sandbox escape vulnerability in Chrome's Mojo IPC. Includes phishing delivery, memory fuzzing, IPC simulation, and logging. Safe for red team demos, detection engineering, and educational use.", - "stargazers_count": 10, - "forks_count": 1, + "stargazers_count": 17, + "forks_count": 2, "created_at": "2025-04-06T03:49:01Z" } ] \ No newline at end of file