PoC-in-GitHub/2025/CVE-2025-48799.json
2025-10-16 03:45:16 +09:00

142 lines
No EOL
4.7 KiB
JSON

[
{
"id": 1016163727,
"name": "CVE-2025-48799",
"full_name": "Wh04m1001\/CVE-2025-48799",
"owner": {
"login": "Wh04m1001",
"id": 44291883,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291883?v=4",
"html_url": "https:\/\/github.com\/Wh04m1001",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Wh04m1001\/CVE-2025-48799",
"description": null,
"fork": false,
"created_at": "2025-07-08T15:26:04Z",
"updated_at": "2025-10-15T11:13:40Z",
"pushed_at": "2025-07-08T19:35:55Z",
"stargazers_count": 250,
"watchers_count": 250,
"has_discussions": false,
"forks_count": 63,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 250,
"score": 0,
"subscribers_count": 3
},
{
"id": 1032550368,
"name": "CVE-2025-48799",
"full_name": "painoob\/CVE-2025-48799",
"owner": {
"login": "painoob",
"id": 8389015,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8389015?v=4",
"html_url": "https:\/\/github.com\/painoob",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/painoob\/CVE-2025-48799",
"description": null,
"fork": false,
"created_at": "2025-08-05T13:22:32Z",
"updated_at": "2025-08-05T13:34:34Z",
"pushed_at": "2025-08-05T13:34:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1048927479,
"name": "CVE-2025-48799-",
"full_name": "gmh5225\/CVE-2025-48799-",
"owner": {
"login": "gmh5225",
"id": 13917777,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13917777?v=4",
"html_url": "https:\/\/github.com\/gmh5225",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/gmh5225\/CVE-2025-48799-",
"description": "Sample exploit of patched vulnerability ",
"fork": false,
"created_at": "2025-09-02T08:29:35Z",
"updated_at": "2025-09-02T08:29:35Z",
"pushed_at": "2025-08-30T04:32:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1062150282,
"name": "CVE-2025-48799",
"full_name": "ukisshinaah\/CVE-2025-48799",
"owner": {
"login": "ukisshinaah",
"id": 164233062,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164233062?v=4",
"html_url": "https:\/\/github.com\/ukisshinaah",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ukisshinaah\/CVE-2025-48799",
"description": "🛡️ Demonstrate CVE-2025-48799, a Windows Update service vulnerability that allows elevation of privilege via arbitrary folder deletion on multi-drive systems.",
"fork": false,
"created_at": "2025-09-22T21:54:01Z",
"updated_at": "2025-10-15T17:50:50Z",
"pushed_at": "2025-10-15T17:50:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"code-analysis",
"cve-2025-48799",
"cybersecurity",
"exploit-development",
"incident-response",
"information-security",
"open-source-security",
"patch-update",
"risk-assessment",
"risk-mitigation",
"security-vulnerability",
"software-bug",
"systems-security",
"threat-intelligence",
"vulnerability-research"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]