mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2026-02-18 16:38:35 +01:00
35 lines
No EOL
1.8 KiB
JSON
35 lines
No EOL
1.8 KiB
JSON
[
|
||
{
|
||
"id": 1138853355,
|
||
"name": "CVE-2025-13834-A-Bluetooth-RFCOMM-Out-of-Bounds-Read-Vulnerability-in-Modern-Wireless-Devices",
|
||
"full_name": "sastraadiwiguna-purpleeliteteaming\/CVE-2025-13834-A-Bluetooth-RFCOMM-Out-of-Bounds-Read-Vulnerability-in-Modern-Wireless-Devices",
|
||
"owner": {
|
||
"login": "sastraadiwiguna-purpleeliteteaming",
|
||
"id": 248769097,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/248769097?v=4",
|
||
"html_url": "https:\/\/github.com\/sastraadiwiguna-purpleeliteteaming",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sastraadiwiguna-purpleeliteteaming\/CVE-2025-13834-A-Bluetooth-RFCOMM-Out-of-Bounds-Read-Vulnerability-in-Modern-Wireless-Devices",
|
||
"description": "CVE-2025-13834 Technical Summary Vulnerability Type: Memory Disclosure \/ Out-of-Bounds (OOB) Read (CWE-125). CVSS Score: 7.5–8.1 (High\/Critical). Vector: Adjacent Network (Bluetooth range) via single-packet exploit without authentication. Root Cause: A critical flaw exists in the RFCOMM protocol’s TEST command (Frame Type 0x10). ",
|
||
"fork": false,
|
||
"created_at": "2026-01-21T07:46:51Z",
|
||
"updated_at": "2026-01-21T15:49:51Z",
|
||
"pushed_at": "2026-01-21T07:52:25Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"has_pull_requests": true,
|
||
"pull_request_creation_policy": "all",
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
}
|
||
] |