PoC-in-GitHub/2025/CVE-2025-55315.json
2025-12-05 15:43:30 +09:00

192 lines
No EOL
6.9 KiB
JSON

[
{
"id": 1077681868,
"name": "CVE-2025-55315-detection-playground",
"full_name": "nickcopi\/CVE-2025-55315-detection-playground",
"owner": {
"login": "nickcopi",
"id": 32046105,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32046105?v=4",
"html_url": "https:\/\/github.com\/nickcopi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nickcopi\/CVE-2025-55315-detection-playground",
"description": "Playground to experiment with different behavior on patched\/unpatched Kestrel for the CVE-2025-55315 HTTP smuggling vulnerability",
"fork": false,
"created_at": "2025-10-16T15:31:27Z",
"updated_at": "2025-11-12T03:01:15Z",
"pushed_at": "2025-10-16T16:28:55Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 0
},
{
"id": 1077744601,
"name": "CVE-2025-55315-repro",
"full_name": "sirredbeard\/CVE-2025-55315-repro",
"owner": {
"login": "sirredbeard",
"id": 33820650,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33820650?v=4",
"html_url": "https:\/\/github.com\/sirredbeard",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sirredbeard\/CVE-2025-55315-repro",
"description": "Tool that reproduces CVE-2025-55315 in ASP.NET Core.",
"fork": false,
"created_at": "2025-10-16T17:14:56Z",
"updated_at": "2025-12-05T03:45:07Z",
"pushed_at": "2025-11-14T17:36:23Z",
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"asp-net-core",
"cve",
"kestrel"
],
"visibility": "public",
"forks": 5,
"watchers": 43,
"score": 0,
"subscribers_count": 0
},
{
"id": 1079056453,
"name": "CVE-2025-55315-",
"full_name": "7huukdlnkjkjba\/CVE-2025-55315-",
"owner": {
"login": "7huukdlnkjkjba",
"id": 170600298,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170600298?v=4",
"html_url": "https:\/\/github.com\/7huukdlnkjkjba",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/7huukdlnkjkjba\/CVE-2025-55315-",
"description": "专业级HTTP请求走私漏洞利用与自动化渗透测试工具",
"fork": false,
"created_at": "2025-10-19T02:02:46Z",
"updated_at": "2025-11-15T15:56:00Z",
"pushed_at": "2025-10-19T02:09:53Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"score": 0,
"subscribers_count": 0
},
{
"id": 1082627893,
"name": "CVE-2025-55315-Scanner-Monitor",
"full_name": "jlinebau\/CVE-2025-55315-Scanner-Monitor",
"owner": {
"login": "jlinebau",
"id": 80418880,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80418880?v=4",
"html_url": "https:\/\/github.com\/jlinebau",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jlinebau\/CVE-2025-55315-Scanner-Monitor",
"description": "Quick and Simple Scripts to Scan for Vulnerable Servers and Packet Level Monitors",
"fork": false,
"created_at": "2025-10-24T14:19:43Z",
"updated_at": "2025-11-13T21:34:11Z",
"pushed_at": "2025-10-24T14:28:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 1094048173,
"name": "CVE-2025-55315-PoC-Exploit",
"full_name": "ZemarKhos\/CVE-2025-55315-PoC-Exploit",
"owner": {
"login": "ZemarKhos",
"id": 25793969,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25793969?v=4",
"html_url": "https:\/\/github.com\/ZemarKhos",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ZemarKhos\/CVE-2025-55315-PoC-Exploit",
"description": "CVE-2025-55315 PoC Exploit",
"fork": false,
"created_at": "2025-11-11T07:22:16Z",
"updated_at": "2025-11-11T07:35:46Z",
"pushed_at": "2025-11-11T07:35:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1105192964,
"name": "CVE-2025-55315",
"full_name": "MartinFabianIonut\/CVE-2025-55315",
"owner": {
"login": "MartinFabianIonut",
"id": 118250277,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118250277?v=4",
"html_url": "https:\/\/github.com\/MartinFabianIonut",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MartinFabianIonut\/CVE-2025-55315",
"description": "Proof-of-concept exploit for CVE-2025-55315 (.NET HTTP Request Smuggling). Demonstrates how improperly parsed chunked encoding lets attackers smuggle requests past proxies and load balancers in vulnerable ASP.NET Core\/Kestrel servers.",
"fork": false,
"created_at": "2025-11-27T09:09:28Z",
"updated_at": "2025-12-02T06:50:29Z",
"pushed_at": "2025-11-30T09:21:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]