38 lines
No EOL
1.5 KiB
JSON
38 lines
No EOL
1.5 KiB
JSON
[
|
|
{
|
|
"name": "CVE-2025-26465",
|
|
"full_name": "rxerium/CVE-2025-26465",
|
|
"html_url": "https://github.com/rxerium/CVE-2025-26465",
|
|
"description": "MitM attack allowing a malicious interloper to impersonate a legitimate server when a client attempts to connect to it",
|
|
"stargazers_count": 4,
|
|
"forks_count": 0,
|
|
"created_at": "2025-02-18T16:53:27Z"
|
|
},
|
|
{
|
|
"name": "CVE-2025-26466",
|
|
"full_name": "rxerium/CVE-2025-26466",
|
|
"html_url": "https://github.com/rxerium/CVE-2025-26466",
|
|
"description": " The OpenSSH client and server are vulnerable to a pre-authentication DoS attack between versions 9.5p1 to 9.9p1 (inclusive) that causes memory and CPU consumption",
|
|
"stargazers_count": 3,
|
|
"forks_count": 0,
|
|
"created_at": "2025-02-18T16:59:09Z"
|
|
},
|
|
{
|
|
"name": "patch-manual-CVE-2025-26465-e-CVE-2025-26466",
|
|
"full_name": "dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466",
|
|
"html_url": "https://github.com/dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466",
|
|
"description": "Patch Manual para a correção das CVE-2025-26465-e-CVE-2025-26466, para sistemas sem update do OpenSSH",
|
|
"stargazers_count": 1,
|
|
"forks_count": 0,
|
|
"created_at": "2025-02-21T09:19:54Z"
|
|
},
|
|
{
|
|
"name": "CVE-2025-26466-msf",
|
|
"full_name": "mrowkoob/CVE-2025-26466-msf",
|
|
"html_url": "https://github.com/mrowkoob/CVE-2025-26466-msf",
|
|
"description": "CVE-2025-26466 - SSH Ping DoS Ruby module for Metasploit Framework",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2025-06-23T13:00:11Z"
|
|
}
|
|
] |