mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-12-28 07:05:32 +01:00
157 lines
No EOL
5.5 KiB
JSON
157 lines
No EOL
5.5 KiB
JSON
[
|
|
{
|
|
"id": 1026757217,
|
|
"name": "CVE-2025-54309-EXPLOIT",
|
|
"full_name": "issamjr\/CVE-2025-54309-EXPLOIT",
|
|
"owner": {
|
|
"login": "issamjr",
|
|
"id": 101994309,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101994309?v=4",
|
|
"html_url": "https:\/\/github.com\/issamjr",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/issamjr\/CVE-2025-54309-EXPLOIT",
|
|
"description": "CrushFTP Unauthenticated Remote Command Execution Exploit",
|
|
"fork": false,
|
|
"created_at": "2025-07-26T14:51:15Z",
|
|
"updated_at": "2025-09-07T14:48:55Z",
|
|
"pushed_at": "2025-07-26T15:03:30Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 4,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 1043994758,
|
|
"name": "watchTowr-vs-CrushFTP-Authentication-Bypass-CVE-2025-54309",
|
|
"full_name": "watchtowrlabs\/watchTowr-vs-CrushFTP-Authentication-Bypass-CVE-2025-54309",
|
|
"owner": {
|
|
"login": "watchtowrlabs",
|
|
"id": 99977116,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99977116?v=4",
|
|
"html_url": "https:\/\/github.com\/watchtowrlabs",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/watchtowrlabs\/watchTowr-vs-CrushFTP-Authentication-Bypass-CVE-2025-54309",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2025-08-25T03:07:13Z",
|
|
"updated_at": "2025-09-09T03:53:47Z",
|
|
"pushed_at": "2025-08-25T03:10:24Z",
|
|
"stargazers_count": 23,
|
|
"watchers_count": 23,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 23,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1046661536,
|
|
"name": "CVE-2025-54309",
|
|
"full_name": "blueisbeautiful\/CVE-2025-54309",
|
|
"owner": {
|
|
"login": "blueisbeautiful",
|
|
"id": 95446029,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95446029?v=4",
|
|
"html_url": "https:\/\/github.com\/blueisbeautiful",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/blueisbeautiful\/CVE-2025-54309",
|
|
"description": "CrushFTP AS2 Authentication Bypass",
|
|
"fork": false,
|
|
"created_at": "2025-08-29T03:05:20Z",
|
|
"updated_at": "2025-08-30T03:36:29Z",
|
|
"pushed_at": "2025-08-30T03:36:26Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1049693361,
|
|
"name": "CVE-2025-54309",
|
|
"full_name": "foregenix\/CVE-2025-54309",
|
|
"owner": {
|
|
"login": "foregenix",
|
|
"id": 60466166,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60466166?v=4",
|
|
"html_url": "https:\/\/github.com\/foregenix",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/foregenix\/CVE-2025-54309",
|
|
"description": "Exploitation scripts for the CrushFTP CVE-2025-54309: vulnerability",
|
|
"fork": false,
|
|
"created_at": "2025-09-03T11:05:05Z",
|
|
"updated_at": "2025-09-12T11:23:33Z",
|
|
"pushed_at": "2025-09-03T11:06:46Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1051858335,
|
|
"name": "CVE-2025-54309__Enhanced_exploit",
|
|
"full_name": "whisperer1290\/CVE-2025-54309__Enhanced_exploit",
|
|
"owner": {
|
|
"login": "whisperer1290",
|
|
"id": 68425420,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68425420?v=4",
|
|
"html_url": "https:\/\/github.com\/whisperer1290",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/whisperer1290\/CVE-2025-54309__Enhanced_exploit",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2025-09-06T21:43:50Z",
|
|
"updated_at": "2025-09-10T18:32:34Z",
|
|
"pushed_at": "2025-09-06T22:02:42Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
}
|
|
] |