PoC-in-GitHub/2025/CVE-2025-25198.json
2025-10-22 09:40:14 +09:00

70 lines
No EOL
2.4 KiB
JSON

[
{
"id": 1075818517,
"name": "CVE-2025-25198-PoC",
"full_name": "Groppoxx\/CVE-2025-25198-PoC",
"owner": {
"login": "Groppoxx",
"id": 82839813,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82839813?v=4",
"html_url": "https:\/\/github.com\/Groppoxx",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Groppoxx\/CVE-2025-25198-PoC",
"description": "PoC for CVE-2025-25198: automated Host header poisoning test for Mailcow - HTTPS listener, automatic cookie\/CSRF handling, captures first reset link.",
"fork": false,
"created_at": "2025-10-14T03:14:09Z",
"updated_at": "2025-10-21T05:07:53Z",
"pushed_at": "2025-10-21T05:07:18Z",
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-25198",
"exploit",
"mailcow",
"poc",
"python"
],
"visibility": "public",
"forks": 0,
"watchers": 16,
"score": 0,
"subscribers_count": 4
},
{
"id": 1075863607,
"name": "CVE-2025-25198",
"full_name": "enzocipher\/CVE-2025-25198",
"owner": {
"login": "enzocipher",
"id": 62620411,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62620411?v=4",
"html_url": "https:\/\/github.com\/enzocipher",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/enzocipher\/CVE-2025-25198",
"description": "Captures password reset tokens from Mailcow Host header injection attacks. ",
"fork": false,
"created_at": "2025-10-14T05:07:26Z",
"updated_at": "2025-10-21T23:13:27Z",
"pushed_at": "2025-10-17T10:02:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]