mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-12-27 06:35:33 +01:00
126 lines
No EOL
4.4 KiB
JSON
126 lines
No EOL
4.4 KiB
JSON
[
|
|
{
|
|
"id": 1085191335,
|
|
"name": "CVE-2025-55752",
|
|
"full_name": "TAM-K592\/CVE-2025-55752",
|
|
"owner": {
|
|
"login": "TAM-K592",
|
|
"id": 8276702,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8276702?v=4",
|
|
"html_url": "https:\/\/github.com\/TAM-K592",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/TAM-K592\/CVE-2025-55752",
|
|
"description": "CVE-2025-55752, Apache Tomcat that allows directory traversal via URL rewrite, and under certain conditions, leads to remote code execution (RCE) if HTTP PUT is enabled.",
|
|
"fork": false,
|
|
"created_at": "2025-10-28T17:49:27Z",
|
|
"updated_at": "2025-11-18T03:22:09Z",
|
|
"pushed_at": "2025-10-28T19:01:28Z",
|
|
"stargazers_count": 9,
|
|
"watchers_count": 9,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 9,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1085576072,
|
|
"name": "CVE-2025-55752",
|
|
"full_name": "masahiro331\/CVE-2025-55752",
|
|
"owner": {
|
|
"login": "masahiro331",
|
|
"id": 20438853,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20438853?v=4",
|
|
"html_url": "https:\/\/github.com\/masahiro331",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/masahiro331\/CVE-2025-55752",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2025-10-29T08:27:13Z",
|
|
"updated_at": "2025-12-01T15:27:45Z",
|
|
"pushed_at": "2025-10-31T07:53:47Z",
|
|
"stargazers_count": 11,
|
|
"watchers_count": 11,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 11,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1086482623,
|
|
"name": "Blackash-CVE-2025-55752",
|
|
"full_name": "Ashwesker\/Blackash-CVE-2025-55752",
|
|
"owner": {
|
|
"login": "Ashwesker",
|
|
"id": 215029052,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/215029052?v=4",
|
|
"html_url": "https:\/\/github.com\/Ashwesker",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Ashwesker\/Blackash-CVE-2025-55752",
|
|
"description": "CVE-2025-55752",
|
|
"fork": false,
|
|
"created_at": "2025-10-30T13:33:39Z",
|
|
"updated_at": "2025-11-29T01:20:56Z",
|
|
"pushed_at": "2025-10-30T17:06:49Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1089498353,
|
|
"name": "CVE-2025-55752",
|
|
"full_name": "AuroraSec-Pivot\/CVE-2025-55752",
|
|
"owner": {
|
|
"login": "AuroraSec-Pivot",
|
|
"id": 149190643,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149190643?v=4",
|
|
"html_url": "https:\/\/github.com\/AuroraSec-Pivot",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/AuroraSec-Pivot\/CVE-2025-55752",
|
|
"description": "基于 Docker 的重现环境,用于复现 Apache Tomcat 10.1.44 中的路径遍历漏洞 CVE-2025-55752。本实验场景可以复现官网报道的RCE",
|
|
"fork": false,
|
|
"created_at": "2025-11-04T12:28:42Z",
|
|
"updated_at": "2025-11-15T17:24:14Z",
|
|
"pushed_at": "2025-11-05T10:24:00Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
}
|
|
] |