github_poc_collector/exploits/2025/CVE-2025-2129.json

38 lines
No EOL
1.6 KiB
JSON

[
{
"name": "CVE-2025-21298",
"full_name": "ynwarcs/CVE-2025-21298",
"html_url": "https://github.com/ynwarcs/CVE-2025-21298",
"description": "Proof of concept & details for CVE-2025-21298",
"stargazers_count": 168,
"forks_count": 45,
"created_at": "2025-01-20T18:16:51Z"
},
{
"name": "CVE-2025-21298",
"full_name": "Dit-Developers/CVE-2025-21298",
"html_url": "https://github.com/Dit-Developers/CVE-2025-21298",
"description": "A Critical Windows OLE Zero-Click Vulnerability",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2025-03-07T16:54:15Z"
},
{
"name": "CVE-2025-21293",
"full_name": "ahmedumarehman/CVE-2025-21293",
"html_url": "https://github.com/ahmedumarehman/CVE-2025-21293",
"description": "CVE-2025-21293 is an elevation of privilege vulnerability in Active Directory Domain Services. It allows \"Network Configuration Operators\" to execute code with SYSTEM privileges via Windows Performance Counters. Affected Windows versions include Windows 10, 11, and Server. Microsoft patched this in January 2025. Apply updates to mitigate risks.",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2025-03-10T20:58:13Z"
},
{
"name": "rtf-ctf-cve-2025-21298",
"full_name": "Denyningbow/rtf-ctf-cve-2025-21298",
"html_url": "https://github.com/Denyningbow/rtf-ctf-cve-2025-21298",
"description": "A safe CTF challenge demonstrating CVE-2025-21298 using RTF and OLE objects.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-28T03:10:19Z"
}
]