github_poc_collector/exploits/2025/CVE-2025-2025.json

272 lines
No EOL
10 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"name": "CVE-2018-20250",
"full_name": "WyAtu/CVE-2018-20250",
"html_url": "https://github.com/WyAtu/CVE-2018-20250",
"description": "exp for https://research.checkpoint.com/extracting-code-execution-from-winrar",
"stargazers_count": 489,
"forks_count": 177,
"created_at": "2019-02-22T04:52:08Z"
},
{
"name": "CVE-2025-24071_PoC",
"full_name": "0x6rss/CVE-2025-24071_PoC",
"html_url": "https://github.com/0x6rss/CVE-2025-24071_PoC",
"description": "CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File",
"stargazers_count": 218,
"forks_count": 36,
"created_at": "2025-03-16T20:10:19Z"
},
{
"name": "CVE-2025-21333-POC",
"full_name": "MrAle98/CVE-2025-21333-POC",
"html_url": "https://github.com/MrAle98/CVE-2025-21333-POC",
"description": "POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY",
"stargazers_count": 180,
"forks_count": 31,
"created_at": "2025-02-27T12:36:55Z"
},
{
"name": "CVE-2025-21298",
"full_name": "ynwarcs/CVE-2025-21298",
"html_url": "https://github.com/ynwarcs/CVE-2025-21298",
"description": "Proof of concept & details for CVE-2025-21298",
"stargazers_count": 171,
"forks_count": 45,
"created_at": "2025-01-20T18:16:51Z"
},
{
"name": "CVE-2025-30208-EXP",
"full_name": "ThumpBo/CVE-2025-30208-EXP",
"html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP",
"description": "CVE-2025-30208-EXP",
"stargazers_count": 160,
"forks_count": 31,
"created_at": "2025-03-26T15:42:31Z"
},
{
"name": "7-Zip-CVE-2025-0411-POC",
"full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC",
"html_url": "https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC",
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
"stargazers_count": 127,
"forks_count": 32,
"created_at": "2025-01-22T14:40:34Z"
},
{
"name": "CVE-2025-26125",
"full_name": "ZeroMemoryEx/CVE-2025-26125",
"html_url": "https://github.com/ZeroMemoryEx/CVE-2025-26125",
"description": "(0day) Local Privilege Escalation in IObit Malware Fighter",
"stargazers_count": 126,
"forks_count": 18,
"created_at": "2025-01-08T05:50:07Z"
},
{
"name": "POC-CVE-2025-24813",
"full_name": "absholi7ly/POC-CVE-2025-24813",
"html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813",
"description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.",
"stargazers_count": 95,
"forks_count": 28,
"created_at": "2025-03-14T07:36:58Z"
},
{
"name": "CVE-2025-24813-PoC",
"full_name": "iSee857/CVE-2025-24813-PoC",
"html_url": "https://github.com/iSee857/CVE-2025-24813-PoC",
"description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)",
"stargazers_count": 75,
"forks_count": 23,
"created_at": "2025-03-13T10:00:03Z"
},
{
"name": "CVE-2025-21420-PoC",
"full_name": "Network-Sec/CVE-2025-21420-PoC",
"html_url": "https://github.com/Network-Sec/CVE-2025-21420-PoC",
"description": "We found a way to DLL sideload with cleanmgr.exe",
"stargazers_count": 72,
"forks_count": 18,
"created_at": "2025-02-17T08:59:22Z"
},
{
"name": "CVE-2025-29927",
"full_name": "aydinnyunus/CVE-2025-29927",
"html_url": "https://github.com/aydinnyunus/CVE-2025-29927",
"description": "CVE-2025-29927 Proof of Concept",
"stargazers_count": 68,
"forks_count": 24,
"created_at": "2025-03-23T12:13:35Z"
},
{
"name": "CVE_2019_2025_EXP",
"full_name": "jltxgcy/CVE_2019_2025_EXP",
"html_url": "https://github.com/jltxgcy/CVE_2019_2025_EXP",
"description": null,
"stargazers_count": 61,
"forks_count": 46,
"created_at": "2019-09-30T02:40:21Z"
},
{
"name": "ingressNightmare-CVE-2025-1974-exps",
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 mirror UID injection -- all available",
"stargazers_count": 60,
"forks_count": 9,
"created_at": "2025-03-26T06:43:36Z"
},
{
"name": "CVE-2025-0282-Ivanti-exploit",
"full_name": "absholi7ly/CVE-2025-0282-Ivanti-exploit",
"html_url": "https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit",
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
"stargazers_count": 44,
"forks_count": 13,
"created_at": "2025-01-11T02:06:51Z"
},
{
"name": "CVE-2025-1974",
"full_name": "yoshino-s/CVE-2025-1974",
"html_url": "https://github.com/yoshino-s/CVE-2025-1974",
"description": null,
"stargazers_count": 43,
"forks_count": 10,
"created_at": "2025-03-25T13:23:01Z"
},
{
"name": "CVE-2025-24118",
"full_name": "jprx/CVE-2025-24118",
"html_url": "https://github.com/jprx/CVE-2025-24118",
"description": "An XNU kernel race condition bug",
"stargazers_count": 41,
"forks_count": 5,
"created_at": "2025-01-30T00:10:44Z"
},
{
"name": "CVE-2025-0282",
"full_name": "sfewer-r7/CVE-2025-0282",
"html_url": "https://github.com/sfewer-r7/CVE-2025-0282",
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
"stargazers_count": 36,
"forks_count": 12,
"created_at": "2025-01-16T14:45:53Z"
},
{
"name": "CVE-2025-24016",
"full_name": "0xjessie21/CVE-2025-24016",
"html_url": "https://github.com/0xjessie21/CVE-2025-24016",
"description": "CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)",
"stargazers_count": 35,
"forks_count": 6,
"created_at": "2025-02-16T11:01:12Z"
},
{
"name": "CVE-2025-23369",
"full_name": "hakivvi/CVE-2025-23369",
"html_url": "https://github.com/hakivvi/CVE-2025-23369",
"description": "GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit",
"stargazers_count": 35,
"forks_count": 3,
"created_at": "2025-02-08T18:13:04Z"
},
{
"name": "CVE-2025-24016",
"full_name": "MuhammadWaseem29/CVE-2025-24016",
"html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24016",
"description": "CVE-2025-24016: RCE in Wazuh server! Remote Code Execution ",
"stargazers_count": 32,
"forks_count": 5,
"created_at": "2025-02-20T23:31:03Z"
},
{
"name": "CVE-2025-24104",
"full_name": "ifpdz/CVE-2025-24104",
"html_url": "https://github.com/ifpdz/CVE-2025-24104",
"description": null,
"stargazers_count": 32,
"forks_count": 4,
"created_at": "2025-01-24T10:41:12Z"
},
{
"name": "CVE-2025-30208",
"full_name": "xuemian168/CVE-2025-30208",
"html_url": "https://github.com/xuemian168/CVE-2025-30208",
"description": "全网首发 The first Vite scanner on the entire network Automatic target asset collection via FOFA Multi-threaded concurrent scanning Automatic CSV report generation",
"stargazers_count": 31,
"forks_count": 1,
"created_at": "2025-03-26T10:26:12Z"
},
{
"name": "CVE-2025-0401",
"full_name": "CyberSecurityUP/CVE-2025-0401",
"html_url": "https://github.com/CyberSecurityUP/CVE-2025-0401",
"description": "Privilege Escalation using Passwd",
"stargazers_count": 28,
"forks_count": 5,
"created_at": "2025-04-01T14:23:43Z"
},
{
"name": "CVE-2025-27636-Apache-Camel-PoC",
"full_name": "akamai/CVE-2025-27636-Apache-Camel-PoC",
"html_url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC",
"description": null,
"stargazers_count": 28,
"forks_count": 8,
"created_at": "2025-03-09T09:42:11Z"
},
{
"name": "CVE-2025-0108-PoC",
"full_name": "iSee857/CVE-2025-0108-PoC",
"html_url": "https://github.com/iSee857/CVE-2025-0108-PoC",
"description": "Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测脚本(CVE-2025-0108)",
"stargazers_count": 26,
"forks_count": 19,
"created_at": "2025-02-13T06:39:25Z"
},
{
"name": "CVE-2018-20250",
"full_name": "QAX-A-Team/CVE-2018-20250",
"html_url": "https://github.com/QAX-A-Team/CVE-2018-20250",
"description": "010 Editor template for ACE archive format & CVE-2018-2025[0-3]",
"stargazers_count": 25,
"forks_count": 14,
"created_at": "2019-02-22T06:47:01Z"
},
{
"name": "CVE-2025-0282",
"full_name": "watchtowrlabs/CVE-2025-0282",
"html_url": "https://github.com/watchtowrlabs/CVE-2025-0282",
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
"stargazers_count": 23,
"forks_count": 9,
"created_at": "2025-01-15T18:27:12Z"
},
{
"name": "CVE-2025-1094-Exploit",
"full_name": "soltanali0/CVE-2025-1094-Exploit",
"html_url": "https://github.com/soltanali0/CVE-2025-1094-Exploit",
"description": "WebSocket and SQL Injection Exploit Script",
"stargazers_count": 23,
"forks_count": 5,
"created_at": "2025-02-27T11:08:10Z"
},
{
"name": "CVE-2018-20250-WinRAR-ACE",
"full_name": "easis/CVE-2018-20250-WinRAR-ACE",
"html_url": "https://github.com/easis/CVE-2018-20250-WinRAR-ACE",
"description": "Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).",
"stargazers_count": 21,
"forks_count": 18,
"created_at": "2019-02-23T01:20:34Z"
},
{
"name": "CVE-2025-20029",
"full_name": "mbadanoiu/CVE-2025-20029",
"html_url": "https://github.com/mbadanoiu/CVE-2025-20029",
"description": "CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP",
"stargazers_count": 20,
"forks_count": 5,
"created_at": "2025-02-23T18:36:11Z"
}
]