mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-12-26 14:15:32 +01:00
219 lines
No EOL
8 KiB
JSON
219 lines
No EOL
8 KiB
JSON
[
|
|
{
|
|
"id": 960328746,
|
|
"name": "CVE-2025-30065",
|
|
"full_name": "h3st4k3r\/CVE-2025-30065",
|
|
"owner": {
|
|
"login": "h3st4k3r",
|
|
"id": 40382991,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40382991?v=4",
|
|
"html_url": "https:\/\/github.com\/h3st4k3r",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/h3st4k3r\/CVE-2025-30065",
|
|
"description": "This PoC targets CVE-2025-30065, an RCE vulnerability in Apache Parquet via Avro schema deserialization. It abuses the getDefaultValue() mechanism to instantiate arbitrary record types during parsing, enabling code execution when untrusted data is processed without proper controls.",
|
|
"fork": false,
|
|
"created_at": "2025-04-04T08:45:24Z",
|
|
"updated_at": "2025-09-04T06:31:54Z",
|
|
"pushed_at": "2025-05-19T18:07:54Z",
|
|
"stargazers_count": 7,
|
|
"watchers_count": 7,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 7,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 960380943,
|
|
"name": "CVE-2025-30065",
|
|
"full_name": "bjornhels\/CVE-2025-30065",
|
|
"owner": {
|
|
"login": "bjornhels",
|
|
"id": 6475389,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6475389?v=4",
|
|
"html_url": "https:\/\/github.com\/bjornhels",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/bjornhels\/CVE-2025-30065",
|
|
"description": "PoC",
|
|
"fork": false,
|
|
"created_at": "2025-04-04T10:37:32Z",
|
|
"updated_at": "2025-05-13T09:17:11Z",
|
|
"pushed_at": "2025-04-07T05:47:47Z",
|
|
"stargazers_count": 12,
|
|
"watchers_count": 12,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 12,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 960892474,
|
|
"name": "CVE-2025-30065-PoC",
|
|
"full_name": "ron-imperva\/CVE-2025-30065-PoC",
|
|
"owner": {
|
|
"login": "ron-imperva",
|
|
"id": 80413188,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80413188?v=4",
|
|
"html_url": "https:\/\/github.com\/ron-imperva",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ron-imperva\/CVE-2025-30065-PoC",
|
|
"description": "CVE-2025-30065 PoC",
|
|
"fork": false,
|
|
"created_at": "2025-04-05T09:43:27Z",
|
|
"updated_at": "2025-04-05T09:44:40Z",
|
|
"pushed_at": "2025-04-05T09:44:37Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 962243562,
|
|
"name": "parquet-rce-poc-CVE-2025-30065",
|
|
"full_name": "mouadk\/parquet-rce-poc-CVE-2025-30065",
|
|
"owner": {
|
|
"login": "mouadk",
|
|
"id": 32769487,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32769487?v=4",
|
|
"html_url": "https:\/\/github.com\/mouadk",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mouadk\/parquet-rce-poc-CVE-2025-30065",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2025-04-07T21:38:24Z",
|
|
"updated_at": "2025-09-04T06:37:38Z",
|
|
"pushed_at": "2025-04-07T23:16:31Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 3,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 970166065,
|
|
"name": "TRAI-001-Critical-RCE-Vulnerability-in-Apache-Parquet-CVE-2025-30065-Simulation",
|
|
"full_name": "ThreatRadarAI\/TRAI-001-Critical-RCE-Vulnerability-in-Apache-Parquet-CVE-2025-30065-Simulation",
|
|
"owner": {
|
|
"login": "ThreatRadarAI",
|
|
"id": 208495564,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/208495564?v=4",
|
|
"html_url": "https:\/\/github.com\/ThreatRadarAI",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ThreatRadarAI\/TRAI-001-Critical-RCE-Vulnerability-in-Apache-Parquet-CVE-2025-30065-Simulation",
|
|
"description": "A CVSS 10.0-rated vulnerability in the parquet-avro Java module allows remote code execution via unsafe deserialization when parsing schemas. Tracked as CVE-2025-30065, this flaw affects Apache Parquet ≤ 1.15.0. All users must upgrade to version 1.15.1 immediately to mitigate exploitation risks.",
|
|
"fork": false,
|
|
"created_at": "2025-04-21T15:28:28Z",
|
|
"updated_at": "2025-05-13T13:11:50Z",
|
|
"pushed_at": "2025-04-22T04:16:53Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 971651999,
|
|
"name": "parquet-canary-exploit-rce-poc-CVE-2025-30065",
|
|
"full_name": "F5-Labs\/parquet-canary-exploit-rce-poc-CVE-2025-30065",
|
|
"owner": {
|
|
"login": "F5-Labs",
|
|
"id": 24276047,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24276047?v=4",
|
|
"html_url": "https:\/\/github.com\/F5-Labs",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/F5-Labs\/parquet-canary-exploit-rce-poc-CVE-2025-30065",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2025-04-23T21:11:08Z",
|
|
"updated_at": "2025-08-17T11:04:36Z",
|
|
"pushed_at": "2025-05-19T18:06:41Z",
|
|
"stargazers_count": 13,
|
|
"watchers_count": 13,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 13,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 1021467157,
|
|
"name": "Blackash-CVE-2025-30065",
|
|
"full_name": "B1ack4sh\/Blackash-CVE-2025-30065",
|
|
"owner": {
|
|
"login": "B1ack4sh",
|
|
"id": 215029052,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/215029052?v=4",
|
|
"html_url": "https:\/\/github.com\/B1ack4sh",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/B1ack4sh\/Blackash-CVE-2025-30065",
|
|
"description": "CVE-2025-30065",
|
|
"fork": false,
|
|
"created_at": "2025-07-17T12:45:59Z",
|
|
"updated_at": "2025-07-24T01:26:47Z",
|
|
"pushed_at": "2025-07-17T13:09:15Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
}
|
|
] |