mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-11-26 23:49:33 +01:00
33 lines
No EOL
1.4 KiB
JSON
33 lines
No EOL
1.4 KiB
JSON
[
|
||
{
|
||
"id": 1053860359,
|
||
"name": "CVE-2025-42957-SAP-S-4HANA-Under-Siege",
|
||
"full_name": "mrk336\/CVE-2025-42957-SAP-S-4HANA-Under-Siege",
|
||
"owner": {
|
||
"login": "mrk336",
|
||
"id": 225503019,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/225503019?v=4",
|
||
"html_url": "https:\/\/github.com\/mrk336",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mrk336\/CVE-2025-42957-SAP-S-4HANA-Under-Siege",
|
||
"description": "CVE‑2025‑42957 exposes an RFC‑enabled SAP S\/4HANA module that lets low‑privileged users inject ABAP code to create admin accounts and gain full control. The article explains the vulnerability, threat model, provides minimal exploit ABAP code, and lists patching & monitoring steps to secure the system",
|
||
"fork": false,
|
||
"created_at": "2025-09-10T03:23:47Z",
|
||
"updated_at": "2025-11-17T13:01:39Z",
|
||
"pushed_at": "2025-09-10T03:29:19Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
}
|
||
] |