Update recent feed data
This commit is contained in:
parent
7a726a735b
commit
b30bc4c3ba
3 changed files with 294 additions and 0 deletions
263
exploits/2025/CVE-2025-24813.json
Normal file
263
exploits/2025/CVE-2025-24813.json
Normal file
|
@ -0,0 +1,263 @@
|
|||
[
|
||||
{
|
||||
"name": "POC-CVE-2025-24813",
|
||||
"full_name": "absholi7ly/POC-CVE-2025-24813",
|
||||
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
|
||||
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
|
||||
"stargazers_count": 106,
|
||||
"forks_count": 28,
|
||||
"created_at": "2025-03-14T07:36:58Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-PoC",
|
||||
"full_name": "iSee857/CVE-2025-24813-PoC",
|
||||
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
|
||||
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
|
||||
"stargazers_count": 79,
|
||||
"forks_count": 25,
|
||||
"created_at": "2025-03-13T10:00:03Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "MuhammadWaseem29/CVE-2025-24813",
|
||||
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24813",
|
||||
"description": null,
|
||||
"stargazers_count": 29,
|
||||
"forks_count": 6,
|
||||
"created_at": "2025-04-05T18:57:08Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2025-24813_poc",
|
||||
"full_name": "FY036/cve-2025-24813_poc",
|
||||
"html_url": "https://github.com/FY036/cve-2025-24813_poc",
|
||||
"description": "cve-2025-24813验证脚本",
|
||||
"stargazers_count": 11,
|
||||
"forks_count": 1,
|
||||
"created_at": "2025-03-14T07:41:40Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "charis3306/CVE-2025-24813",
|
||||
"html_url": "https://github.com/charis3306/CVE-2025-24813",
|
||||
"description": "CVE-2025-24813利用工具",
|
||||
"stargazers_count": 10,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-16T11:59:59Z"
|
||||
},
|
||||
{
|
||||
"name": "Poc_for_CVE-2025-24813",
|
||||
"full_name": "Franconyu/Poc_for_CVE-2025-24813",
|
||||
"html_url": "https://github.com/Franconyu/Poc_for_CVE-2025-24813",
|
||||
"description": "CVE-2025-24813 poc",
|
||||
"stargazers_count": 7,
|
||||
"forks_count": 2,
|
||||
"created_at": "2025-04-10T14:49:14Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Exploit",
|
||||
"full_name": "msadeghkarimi/CVE-2025-24813-Exploit",
|
||||
"html_url": "https://github.com/msadeghkarimi/CVE-2025-24813-Exploit",
|
||||
"description": "Apache Tomcat Remote Code Execution (RCE) Exploit - CVE-2025-24813",
|
||||
"stargazers_count": 5,
|
||||
"forks_count": 1,
|
||||
"created_at": "2025-03-18T08:42:12Z"
|
||||
},
|
||||
{
|
||||
"name": "Tomcat-CVE_2025_24813",
|
||||
"full_name": "u238/Tomcat-CVE_2025_24813",
|
||||
"html_url": "https://github.com/u238/Tomcat-CVE_2025_24813",
|
||||
"description": "A playground to test the RCE exploit for tomcat CVE-2025-24813",
|
||||
"stargazers_count": 4,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-24T18:47:40Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "AsaL1n/CVE-2025-24813",
|
||||
"html_url": "https://github.com/AsaL1n/CVE-2025-24813",
|
||||
"description": "simple exp for CVE-2025-24813",
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-05T09:07:13Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813_POC",
|
||||
"full_name": "N0c1or/CVE-2025-24813_POC",
|
||||
"html_url": "https://github.com/N0c1or/CVE-2025-24813_POC",
|
||||
"description": "CVE-2025-24813_POC",
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-14T03:11:40Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "beyond-devsecops/CVE-2025-24813",
|
||||
"html_url": "https://github.com/beyond-devsecops/CVE-2025-24813",
|
||||
"description": "Session Exploit",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-24T17:47:10Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-apache-tomcat",
|
||||
"full_name": "imbas007/CVE-2025-24813-apache-tomcat",
|
||||
"html_url": "https://github.com/imbas007/CVE-2025-24813-apache-tomcat",
|
||||
"description": "Nuclei Template CVE-2025–24813",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 1,
|
||||
"created_at": "2025-03-17T22:39:38Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "gregk4sec/CVE-2025-24813",
|
||||
"html_url": "https://github.com/gregk4sec/CVE-2025-24813",
|
||||
"description": "Security Researcher",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-14T05:39:33Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "AlperenY-cs/CVE-2025-24813",
|
||||
"html_url": "https://github.com/AlperenY-cs/CVE-2025-24813",
|
||||
"description": " Create lab for CVE-2025-24813",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-28T09:44:28Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-POC",
|
||||
"full_name": "Alaatk/CVE-2025-24813-POC",
|
||||
"html_url": "https://github.com/Alaatk/CVE-2025-24813-POC",
|
||||
"description": "CVE-2025-24813 Apache Tomcat RCE Proof of Concept (PoC)",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-21T18:05:27Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Scanner",
|
||||
"full_name": "issamjr/CVE-2025-24813-Scanner",
|
||||
"html_url": "https://github.com/issamjr/CVE-2025-24813-Scanner",
|
||||
"description": "CVE-2025-24813 - Apache Tomcat Vulnerability Scanner",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-17T03:58:34Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-PoC",
|
||||
"full_name": "tonyarris/CVE-2025-24813-PoC",
|
||||
"html_url": "https://github.com/tonyarris/CVE-2025-24813-PoC",
|
||||
"description": "A PoC for CVE-2025-24813",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-22T15:16:41Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "manjula-aw/CVE-2025-24813",
|
||||
"html_url": "https://github.com/manjula-aw/CVE-2025-24813",
|
||||
"description": "This repository contains a shell script based POC on Apache Tomcat CVE-2025-24813. It allow you to easily test the vulnerability on any version of Apache Tomcat",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-30T09:39:45Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-checker",
|
||||
"full_name": "horsehacks/CVE-2025-24813-checker",
|
||||
"html_url": "https://github.com/horsehacks/CVE-2025-24813-checker",
|
||||
"description": "Hello researchers, I have a checker for the recent vulnerability CVE-2025-24813-checker.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-07T22:43:56Z"
|
||||
},
|
||||
{
|
||||
"name": "Tomcat-CVE-2025-24813",
|
||||
"full_name": "B1gN0Se/Tomcat-CVE-2025-24813",
|
||||
"html_url": "https://github.com/B1gN0Se/Tomcat-CVE-2025-24813",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-31T19:01:28Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813",
|
||||
"full_name": "GadaLuBau1337/CVE-2025-24813",
|
||||
"html_url": "https://github.com/GadaLuBau1337/CVE-2025-24813",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-08T14:52:37Z"
|
||||
},
|
||||
{
|
||||
"name": "lab-cve-2025-24813",
|
||||
"full_name": "ps-interactive/lab-cve-2025-24813",
|
||||
"html_url": "https://github.com/ps-interactive/lab-cve-2025-24813",
|
||||
"description": "Resources for teh Apache Tomcat CVE lab",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-19T19:55:02Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-POC",
|
||||
"full_name": "La3B0z/CVE-2025-24813-POC",
|
||||
"html_url": "https://github.com/La3B0z/CVE-2025-24813-POC",
|
||||
"description": " CVE-2025-24813-POC JSP Web Shell Uploader",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2025-04-06T19:36:48Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-Scanner",
|
||||
"full_name": "Mattb709/CVE-2025-24813-Scanner",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-Scanner",
|
||||
"description": "CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T19:12:39Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-POC",
|
||||
"full_name": "f8l124/CVE-2025-24813-POC",
|
||||
"html_url": "https://github.com/f8l124/CVE-2025-24813-POC",
|
||||
"description": "A simple, easy-to-use POC for CVE-2025-42813 (Apache Tomcat versions below 9.0.99).",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-09T15:20:32Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-noPoC",
|
||||
"full_name": "Heimd411/CVE-2025-24813-noPoC",
|
||||
"html_url": "https://github.com/Heimd411/CVE-2025-24813-noPoC",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-07T16:17:06Z"
|
||||
},
|
||||
{
|
||||
"name": "Spring-Boot-Tomcat-CVE-2025-24813",
|
||||
"full_name": "n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813",
|
||||
"html_url": "https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813",
|
||||
"description": "POC for CVE-2025-24813 using Spring-Boot",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-20T22:52:00Z"
|
||||
},
|
||||
{
|
||||
"name": "Apache-Tomcat-Vulnerability-POC-CVE-2025-24813",
|
||||
"full_name": "michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813",
|
||||
"html_url": "https://github.com/michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813",
|
||||
"description": "Apache Tomcat Vulnerability POC (CVE-2025-24813)",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-19T14:32:01Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"full_name": "Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"html_url": "https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE",
|
||||
"description": "A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-04-12T17:38:02Z"
|
||||
}
|
||||
]
|
11
exploits/2025/CVE-2025-2510.json
Normal file
11
exploits/2025/CVE-2025-2510.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2025-25101",
|
||||
"full_name": "Nxploited/CVE-2025-25101",
|
||||
"html_url": "https://github.com/Nxploited/CVE-2025-25101",
|
||||
"description": "WordPress Munk Sites plugin <= 1.0.7 - CSRF to Arbitrary Plugin Installation vulnerability",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-14T02:44:39Z"
|
||||
}
|
||||
]
|
20
exploits/2025/CVE-2025-2516.json
Normal file
20
exploits/2025/CVE-2025-2516.json
Normal file
|
@ -0,0 +1,20 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2025-25163",
|
||||
"full_name": "RandomRobbieBF/CVE-2025-25163",
|
||||
"html_url": "https://github.com/RandomRobbieBF/CVE-2025-25163",
|
||||
"description": "Plugin A/B Image Optimizer <= 3.3 - Authenticated (Subscriber+) Arbitrary File Download",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-02-18T10:25:40Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2025-25163-Nuclei-Template",
|
||||
"full_name": "RootHarpy/CVE-2025-25163-Nuclei-Template",
|
||||
"html_url": "https://github.com/RootHarpy/CVE-2025-25163-Nuclei-Template",
|
||||
"description": "This repository features a Nuclei template specifically designed to detect the Path Traversal vulnerability (CVE-2025-25163) in the Plugin A/B Image Optimizer for WordPress. This vulnerability poses a critical security risk, allowing unauthorized access to sensitive server files.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-02-19T03:57:35Z"
|
||||
}
|
||||
]
|
Loading…
Add table
Reference in a new issue