PoC-in-GitHub/2025/CVE-2025-20265.json
2025-11-07 21:43:01 +09:00

101 lines
No EOL
3.7 KiB
JSON

[
{
"id": 1038411205,
"name": "cve2025-20265",
"full_name": "jordan922\/cve2025-20265",
"owner": {
"login": "jordan922",
"id": 87998876,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87998876?v=4",
"html_url": "https:\/\/github.com\/jordan922",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jordan922\/cve2025-20265",
"description": "Safe Python script to detect Cisco FMC instances potentially vulnerable to CVE-2025-20265. Uses official FMC API to check version, supports single\/multi-target scanning, and includes a harmless local PoC marker.",
"fork": false,
"created_at": "2025-08-15T06:35:01Z",
"updated_at": "2025-09-08T17:31:40Z",
"pushed_at": "2025-08-15T06:42:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 0
},
{
"id": 1058160471,
"name": "cve_2025_20265",
"full_name": "saruman9\/cve_2025_20265",
"owner": {
"login": "saruman9",
"id": 4244396,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4244396?v=4",
"html_url": "https:\/\/github.com\/saruman9",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/saruman9\/cve_2025_20265",
"description": "PoC for CVE-2025-20265 Cisco Secure FMC Software RADIUS Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2025-09-16T17:48:10Z",
"updated_at": "2025-09-22T19:31:17Z",
"pushed_at": "2025-09-16T17:49:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cisco",
"cisco-fmc",
"command-injection",
"cve",
"poc"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1060653799,
"name": "day08-CISCO-fmc-sim",
"full_name": "amalpvatayam67\/day08-CISCO-fmc-sim",
"owner": {
"login": "amalpvatayam67",
"id": 200071444,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/200071444?v=4",
"html_url": "https:\/\/github.com\/amalpvatayam67",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/amalpvatayam67\/day08-CISCO-fmc-sim",
"description": "This is a minimal, educational simulation that demonstrates the _impact_ class of a management-plane parsing RCE (inspired by CVE-2025-20265). It intentionally executes commands from crafted input for local learning only.",
"fork": false,
"created_at": "2025-09-20T10:15:03Z",
"updated_at": "2025-11-07T12:20:10Z",
"pushed_at": "2025-09-20T10:22:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]