PoC-in-GitHub/2025/CVE-2025-64446.json
2025-11-26 03:44:27 +09:00

319 lines
No EOL
12 KiB
JSON

[
{
"id": 1096638586,
"name": "CVE-2025-64446-PoC---FortiWeb-Path-Traversal",
"full_name": "fevar54\/CVE-2025-64446-PoC---FortiWeb-Path-Traversal",
"owner": {
"login": "fevar54",
"id": 80516843,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80516843?v=4",
"html_url": "https:\/\/github.com\/fevar54",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/fevar54\/CVE-2025-64446-PoC---FortiWeb-Path-Traversal",
"description": "# CVE-2025-64446 PoC - FortiWeb Path Traversal Proof of Concept para la vulnerabilidad de path traversal en Fortinet FortiWeb que permite ejecución remota de comandos. Incluye herramienta de detección para fines educativos. **⚠️ SOLO USO EDUCATIVO - NO PARA EXPLOTACIÓN ⚠️**",
"fork": false,
"created_at": "2025-11-14T18:10:24Z",
"updated_at": "2025-11-15T21:50:02Z",
"pushed_at": "2025-11-14T18:13:33Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 0
},
{
"id": 1096686833,
"name": "CVE-2025-64446-FortiWeb-CGI-Bypass-PoC",
"full_name": "sxyrxyy\/CVE-2025-64446-FortiWeb-CGI-Bypass-PoC",
"owner": {
"login": "sxyrxyy",
"id": 125439203,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125439203?v=4",
"html_url": "https:\/\/github.com\/sxyrxyy",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sxyrxyy\/CVE-2025-64446-FortiWeb-CGI-Bypass-PoC",
"description": null,
"fork": false,
"created_at": "2025-11-14T19:49:47Z",
"updated_at": "2025-11-17T08:53:26Z",
"pushed_at": "2025-11-14T19:49:55Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"score": 0,
"subscribers_count": 0
},
{
"id": 1096911328,
"name": "Blackash-CVE-2025-64446",
"full_name": "B1ack4sh\/Blackash-CVE-2025-64446",
"owner": {
"login": "B1ack4sh",
"id": 215029052,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/215029052?v=4",
"html_url": "https:\/\/github.com\/B1ack4sh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/B1ack4sh\/Blackash-CVE-2025-64446",
"description": "CVE-2025-64446",
"fork": false,
"created_at": "2025-11-15T07:00:55Z",
"updated_at": "2025-11-23T10:22:00Z",
"pushed_at": "2025-11-23T10:21:57Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 1097196574,
"name": "CVE-2025-64446-Exploit",
"full_name": "soltanali0\/CVE-2025-64446-Exploit",
"owner": {
"login": "soltanali0",
"id": 87374678,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87374678?v=4",
"html_url": "https:\/\/github.com\/soltanali0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/soltanali0\/CVE-2025-64446-Exploit",
"description": null,
"fork": false,
"created_at": "2025-11-15T18:01:08Z",
"updated_at": "2025-11-25T16:19:53Z",
"pushed_at": "2025-11-15T18:08:40Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 11,
"score": 0,
"subscribers_count": 0
},
{
"id": 1098211029,
"name": "CVE-2025-64446",
"full_name": "sensepost\/CVE-2025-64446",
"owner": {
"login": "sensepost",
"id": 1193973,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1193973?v=4",
"html_url": "https:\/\/github.com\/sensepost",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sensepost\/CVE-2025-64446",
"description": "A scanner for the FortiNet vulnerability CVE-2025-64446",
"fork": false,
"created_at": "2025-11-17T11:58:18Z",
"updated_at": "2025-11-22T22:25:34Z",
"pushed_at": "2025-11-18T16:27:06Z",
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-64446"
],
"visibility": "public",
"forks": 5,
"watchers": 19,
"score": 0,
"subscribers_count": 0
},
{
"id": 1098349475,
"name": "CVE-2025-64446",
"full_name": "D3crypT0r\/CVE-2025-64446",
"owner": {
"login": "D3crypT0r",
"id": 66831571,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66831571?v=4",
"html_url": "https:\/\/github.com\/D3crypT0r",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/D3crypT0r\/CVE-2025-64446",
"description": "FortiWeb Unauthenticated RCE via Path Traversal & CGI Auth Bypass",
"fork": false,
"created_at": "2025-11-17T15:20:22Z",
"updated_at": "2025-11-17T15:21:29Z",
"pushed_at": "2025-11-17T15:21:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1098473529,
"name": "CVE-2025-64446",
"full_name": "verylazytech\/CVE-2025-64446",
"owner": {
"login": "verylazytech",
"id": 172168670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
"html_url": "https:\/\/github.com\/verylazytech",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/verylazytech\/CVE-2025-64446",
"description": "CVE-2025-64446 - A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.",
"fork": false,
"created_at": "2025-11-17T18:28:46Z",
"updated_at": "2025-11-25T16:19:25Z",
"pushed_at": "2025-11-19T09:25:12Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 0
},
{
"id": 1098927955,
"name": "CVE-2025-64446_CVE-2025-58034",
"full_name": "lincemorado97\/CVE-2025-64446_CVE-2025-58034",
"owner": {
"login": "lincemorado97",
"id": 243954988,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/243954988?v=4",
"html_url": "https:\/\/github.com\/lincemorado97",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lincemorado97\/CVE-2025-64446_CVE-2025-58034",
"description": "FortiWeb Remote Code Execution (RCE) Exploit via CVE-2025-64446 + CVE-2025-58034 Chain",
"fork": false,
"created_at": "2025-11-18T10:25:18Z",
"updated_at": "2025-11-24T17:23:29Z",
"pushed_at": "2025-11-20T03:54:32Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-58034",
"cve-2025-64446",
"fortinet-vul",
"fortiweb-authbypass"
],
"visibility": "public",
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 1099999369,
"name": "CVE-2025-64446-",
"full_name": "Death112233\/CVE-2025-64446-",
"owner": {
"login": "Death112233",
"id": 142390595,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142390595?v=4",
"html_url": "https:\/\/github.com\/Death112233",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Death112233\/CVE-2025-64446-",
"description": null,
"fork": false,
"created_at": "2025-11-19T17:54:34Z",
"updated_at": "2025-11-19T17:54:38Z",
"pushed_at": "2025-11-19T17:54:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1100930271,
"name": "cve-2025-64446-fortiweb-exploit",
"full_name": "AN5I\/cve-2025-64446-fortiweb-exploit",
"owner": {
"login": "AN5I",
"id": 243373094,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/243373094?v=4",
"html_url": "https:\/\/github.com\/AN5I",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AN5I\/cve-2025-64446-fortiweb-exploit",
"description": "Security research tool for detecting and testing CVE-2025-64446 (FortiWeb Path Traversal RCE vulnerability)",
"fork": false,
"created_at": "2025-11-21T00:37:37Z",
"updated_at": "2025-11-21T01:35:24Z",
"pushed_at": "2025-11-21T00:37:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]