74 lines
No EOL
2.9 KiB
JSON
74 lines
No EOL
2.9 KiB
JSON
[
|
||
{
|
||
"name": "ingressNightmare-CVE-2025-1974-exps",
|
||
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
||
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
|
||
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available",
|
||
"stargazers_count": 60,
|
||
"forks_count": 9,
|
||
"created_at": "2025-03-26T06:43:36Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-1974",
|
||
"full_name": "yoshino-s/CVE-2025-1974",
|
||
"html_url": "https://github.com/yoshino-s/CVE-2025-1974",
|
||
"description": null,
|
||
"stargazers_count": 43,
|
||
"forks_count": 10,
|
||
"created_at": "2025-03-25T13:23:01Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-1974-poc",
|
||
"full_name": "hi-unc1e/CVE-2025-1974-poc",
|
||
"html_url": "https://github.com/hi-unc1e/CVE-2025-1974-poc",
|
||
"description": "PoC of CVE-2025-1974, modified from the world-first PoC~",
|
||
"stargazers_count": 3,
|
||
"forks_count": 2,
|
||
"created_at": "2025-03-26T16:54:37Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-1974",
|
||
"full_name": "zwxxb/CVE-2025-1974",
|
||
"html_url": "https://github.com/zwxxb/CVE-2025-1974",
|
||
"description": "Poc for Ingress RCE ",
|
||
"stargazers_count": 2,
|
||
"forks_count": 3,
|
||
"created_at": "2025-03-26T14:49:29Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-1974",
|
||
"full_name": "0xBingo/CVE-2025-1974",
|
||
"html_url": "https://github.com/0xBingo/CVE-2025-1974",
|
||
"description": "A minimal test tool to help detect annotation injection vulnerabilities in Kubernetes NGINX Ingress controllers. This script sends a crafted AdmissionReview request to simulate a potential exploit path from CVE-2025-1974 and checks for signs of misinterpreted annotations in controller logs.",
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2025-03-27T03:28:01Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-1974",
|
||
"full_name": "yanmarques/CVE-2025-1974",
|
||
"html_url": "https://github.com/yanmarques/CVE-2025-1974",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2025-03-25T18:49:23Z"
|
||
},
|
||
{
|
||
"name": "CVE-2025-1974",
|
||
"full_name": "zulloper/CVE-2025-1974",
|
||
"html_url": "https://github.com/zulloper/CVE-2025-1974",
|
||
"description": "CVE-2025-1974 PoC 코드",
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2025-03-31T08:31:03Z"
|
||
},
|
||
{
|
||
"name": "POC-IngressNightmare-CVE-2025-1974",
|
||
"full_name": "rjhaikal/POC-IngressNightmare-CVE-2025-1974",
|
||
"html_url": "https://github.com/rjhaikal/POC-IngressNightmare-CVE-2025-1974",
|
||
"description": "POC IngressNightmare (CVE-2025-1974), modified from https://github.com/yoshino-s/CVE-2025-1974",
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2025-03-28T16:57:02Z"
|
||
}
|
||
] |