mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2026-03-14 04:08:33 +01:00
103 lines
No EOL
3.7 KiB
JSON
103 lines
No EOL
3.7 KiB
JSON
[
|
||
{
|
||
"id": 687169714,
|
||
"name": "CVE-2023-25136",
|
||
"full_name": "Business1sg00d\/CVE-2023-25136",
|
||
"owner": {
|
||
"login": "Business1sg00d",
|
||
"id": 112768445,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112768445?v=4",
|
||
"html_url": "https:\/\/github.com\/Business1sg00d",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Business1sg00d\/CVE-2023-25136",
|
||
"description": "Looking into the memory when sshd 9.1p1 aborts due to a double free bug.",
|
||
"fork": false,
|
||
"created_at": "2023-09-04T19:28:43Z",
|
||
"updated_at": "2023-10-21T09:31:07Z",
|
||
"pushed_at": "2023-09-08T17:49:47Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 694642627,
|
||
"name": "CVE-2023-25136",
|
||
"full_name": "malvika-thakur\/CVE-2023-25136",
|
||
"owner": {
|
||
"login": "malvika-thakur",
|
||
"id": 60217652,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60217652?v=4",
|
||
"html_url": "https:\/\/github.com\/malvika-thakur",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/malvika-thakur\/CVE-2023-25136",
|
||
"description": "OpenSSH Pre-Auth Double Free CVE-2023-25136 – Writeup and Proof-of-Concept",
|
||
"fork": false,
|
||
"created_at": "2023-09-21T12:05:35Z",
|
||
"updated_at": "2024-02-21T16:24:14Z",
|
||
"pushed_at": "2023-09-21T12:35:55Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 917513746,
|
||
"name": "CVE-2023-25136",
|
||
"full_name": "mrmtwoj\/CVE-2023-25136",
|
||
"owner": {
|
||
"login": "mrmtwoj",
|
||
"id": 22832463,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22832463?v=4",
|
||
"html_url": "https:\/\/github.com\/mrmtwoj",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mrmtwoj\/CVE-2023-25136",
|
||
"description": "This vulnerability is of the \"double-free\" type, which occurs during the processing of key exchange (KEX) algorithms in OpenSSH. A \"double-free\" vulnerability happens when memory that has already been freed is freed again. This issue can indirectly lead to remote code execution (RCE) by an attacker.",
|
||
"fork": false,
|
||
"created_at": "2025-01-16T06:07:45Z",
|
||
"updated_at": "2025-10-09T13:36:56Z",
|
||
"pushed_at": "2025-01-16T06:25:21Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"acyber",
|
||
"cve",
|
||
"cve-2023-25136",
|
||
"poc",
|
||
"python",
|
||
"rce",
|
||
"rce-exploit"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
}
|
||
] |