mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-12-26 22:25:31 +01:00
188 lines
No EOL
6.5 KiB
JSON
188 lines
No EOL
6.5 KiB
JSON
[
|
|
{
|
|
"id": 1026757217,
|
|
"name": "CVE-2025-54309-EXPLOIT",
|
|
"full_name": "issamjr\/CVE-2025-54309-EXPLOIT",
|
|
"owner": {
|
|
"login": "issamjr",
|
|
"id": 101994309,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101994309?v=4",
|
|
"html_url": "https:\/\/github.com\/issamjr",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/issamjr\/CVE-2025-54309-EXPLOIT",
|
|
"description": "CrushFTP Unauthenticated Remote Command Execution Exploit",
|
|
"fork": false,
|
|
"created_at": "2025-07-26T14:51:15Z",
|
|
"updated_at": "2025-10-27T12:40:38Z",
|
|
"pushed_at": "2025-07-26T15:03:30Z",
|
|
"stargazers_count": 7,
|
|
"watchers_count": 7,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 7,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 1043994758,
|
|
"name": "watchTowr-vs-CrushFTP-Authentication-Bypass-CVE-2025-54309",
|
|
"full_name": "watchtowrlabs\/watchTowr-vs-CrushFTP-Authentication-Bypass-CVE-2025-54309",
|
|
"owner": {
|
|
"login": "watchtowrlabs",
|
|
"id": 99977116,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99977116?v=4",
|
|
"html_url": "https:\/\/github.com\/watchtowrlabs",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/watchtowrlabs\/watchTowr-vs-CrushFTP-Authentication-Bypass-CVE-2025-54309",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2025-08-25T03:07:13Z",
|
|
"updated_at": "2025-10-21T22:42:59Z",
|
|
"pushed_at": "2025-08-25T03:10:24Z",
|
|
"stargazers_count": 26,
|
|
"watchers_count": 26,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 26,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1046661536,
|
|
"name": "CVE-2025-54309",
|
|
"full_name": "brokendreamsclub\/CVE-2025-54309",
|
|
"owner": {
|
|
"login": "brokendreamsclub",
|
|
"id": 95446029,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95446029?v=4",
|
|
"html_url": "https:\/\/github.com\/brokendreamsclub",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/brokendreamsclub\/CVE-2025-54309",
|
|
"description": "CrushFTP AS2 Authentication Bypass",
|
|
"fork": false,
|
|
"created_at": "2025-08-29T03:05:20Z",
|
|
"updated_at": "2025-08-30T03:36:29Z",
|
|
"pushed_at": "2025-08-30T03:36:26Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1049693361,
|
|
"name": "CVE-2025-54309",
|
|
"full_name": "foregenix\/CVE-2025-54309",
|
|
"owner": {
|
|
"login": "foregenix",
|
|
"id": 60466166,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60466166?v=4",
|
|
"html_url": "https:\/\/github.com\/foregenix",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/foregenix\/CVE-2025-54309",
|
|
"description": "Exploitation scripts for the CrushFTP CVE-2025-54309: vulnerability",
|
|
"fork": false,
|
|
"created_at": "2025-09-03T11:05:05Z",
|
|
"updated_at": "2025-09-12T11:23:33Z",
|
|
"pushed_at": "2025-09-03T11:06:46Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1051858335,
|
|
"name": "CVE-2025-54309__Enhanced_exploit",
|
|
"full_name": "whisperer1290\/CVE-2025-54309__Enhanced_exploit",
|
|
"owner": {
|
|
"login": "whisperer1290",
|
|
"id": 68425420,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68425420?v=4",
|
|
"html_url": "https:\/\/github.com\/whisperer1290",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/whisperer1290\/CVE-2025-54309__Enhanced_exploit",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2025-09-06T21:43:50Z",
|
|
"updated_at": "2025-09-10T18:32:34Z",
|
|
"pushed_at": "2025-09-06T22:02:42Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1056005144,
|
|
"name": "CrushFTP_CVE-2025-54309",
|
|
"full_name": "chin-tech\/CrushFTP_CVE-2025-54309",
|
|
"owner": {
|
|
"login": "chin-tech",
|
|
"id": 195065467,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/195065467?v=4",
|
|
"html_url": "https:\/\/github.com\/chin-tech",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/chin-tech\/CrushFTP_CVE-2025-54309",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2025-09-13T07:42:08Z",
|
|
"updated_at": "2025-09-13T07:42:42Z",
|
|
"pushed_at": "2025-09-13T07:42:39Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
}
|
|
] |