mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-12-26 14:15:32 +01:00
33 lines
No EOL
1.4 KiB
JSON
33 lines
No EOL
1.4 KiB
JSON
[
|
|
{
|
|
"id": 1083223921,
|
|
"name": "CVE-2025-65346",
|
|
"full_name": "Theethat-Thamwasin\/CVE-2025-65346",
|
|
"owner": {
|
|
"login": "Theethat-Thamwasin",
|
|
"id": 175581567,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/175581567?v=4",
|
|
"html_url": "https:\/\/github.com\/Theethat-Thamwasin",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Theethat-Thamwasin\/CVE-2025-65346",
|
|
"description": "A Path Traversal vulnerability in the unzip\/extract functionality of the affected application allows an attacker to write files to arbitrary filesystem locations during archive extraction. Because the extraction routine fails to sanitize destination paths inside ZIP entries, an attacker can craft ZIP archives containing traversal sequences (e.g., .",
|
|
"fork": false,
|
|
"created_at": "2025-10-25T15:36:05Z",
|
|
"updated_at": "2025-12-03T15:49:15Z",
|
|
"pushed_at": "2025-11-30T07:40:47Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
}
|
|
] |