Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Tomcat | 11.0.0-M1 ~ 11.0.10 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2025-55752, Apache Tomcat that allows directory traversal via URL rewrite, and under certain conditions, leads to remote code execution (RCE) if HTTP PUT is enabled. | https://github.com/TAM-K592/CVE-2025-55752 | POC Details |
| 2 | None | https://github.com/masahiro331/CVE-2025-55752 | POC Details |
| 3 | CVE-2025-55752 | https://github.com/B1ack4sh/Blackash-CVE-2025-55752 | POC Details |
| 4 | 基于 Docker 的重现环境,用于复现 Apache Tomcat 10.1.44 中的路径遍历漏洞 CVE-2025-55752。本实验场景可以复现官网报道的RCE | https://github.com/AuroraSec-Pivot/CVE-2025-55752 | POC Details |
| 5 | CVE-2025-55752 | https://github.com/Ashwesker/Blackash-CVE-2025-55752 | POC Details |
| 6 | None | https://github.com/Jimmy01240397/CVE-2025-55752 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-55754 | Apache Tomcat: console manipulation via escape sequences in log messages | |
| CVE-2025-61795 | Apache Tomcat: Delayed cleaning of multi-part upload temporary files may lead to DoS |
No comments yet