PoC-in-GitHub/2025/CVE-2025-6218.json
2025-12-19 03:45:41 +09:00

219 lines
No EOL
8 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 1009320594,
"name": "CVE-2025-6218_WinRAR",
"full_name": "speinador\/CVE-2025-6218_WinRAR",
"owner": {
"login": "speinador",
"id": 51430049,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51430049?v=4",
"html_url": "https:\/\/github.com\/speinador",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/speinador\/CVE-2025-6218_WinRAR",
"description": null,
"fork": false,
"created_at": "2025-06-27T00:11:03Z",
"updated_at": "2025-12-15T16:25:01Z",
"pushed_at": "2025-06-27T00:16:27Z",
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 16,
"score": 0,
"subscribers_count": 0
},
{
"id": 1010769447,
"name": "CVE-2025-6218",
"full_name": "ignis-sec\/CVE-2025-6218",
"owner": {
"login": "ignis-sec",
"id": 16636092,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16636092?v=4",
"html_url": "https:\/\/github.com\/ignis-sec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ignis-sec\/CVE-2025-6218",
"description": "A simple proof of concept for WinRAR Path Traversal | RCE | CVE-2025-6218",
"fork": false,
"created_at": "2025-06-29T19:06:53Z",
"updated_at": "2025-09-06T11:06:12Z",
"pushed_at": "2025-06-29T19:18:39Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 10,
"score": 0,
"subscribers_count": 0
},
{
"id": 1011625963,
"name": "CVE-2025-6218-POC",
"full_name": "skimask1690\/CVE-2025-6218-POC",
"owner": {
"login": "skimask1690",
"id": 123434315,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123434315?v=4",
"html_url": "https:\/\/github.com\/skimask1690",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/skimask1690\/CVE-2025-6218-POC",
"description": "Proof of Concept for CVE-2025-6218, demonstrating the exploitation of a vulnerability in WinRAR versions 7.11 and under, involving improper handling of archive extraction paths.",
"fork": false,
"created_at": "2025-07-01T05:34:57Z",
"updated_at": "2025-11-17T09:27:57Z",
"pushed_at": "2025-07-01T15:10:12Z",
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 24,
"score": 0,
"subscribers_count": 0
},
{
"id": 1012914311,
"name": "CVE-2025-6218-POC",
"full_name": "mulwareX\/CVE-2025-6218-POC",
"owner": {
"login": "mulwareX",
"id": 179304663,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179304663?v=4",
"html_url": "https:\/\/github.com\/mulwareX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mulwareX\/CVE-2025-6218-POC",
"description": "RARLAB WinRAR Directory Traversal Remote Code Execution",
"fork": false,
"created_at": "2025-07-03T04:52:14Z",
"updated_at": "2025-12-18T13:35:05Z",
"pushed_at": "2025-07-03T05:11:42Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 9,
"score": 0,
"subscribers_count": 0
},
{
"id": 1017070282,
"name": "CVE-2025-6218-WinRAR-Directory-Traversal-RCE",
"full_name": "absholi7ly\/CVE-2025-6218-WinRAR-Directory-Traversal-RCE",
"owner": {
"login": "absholi7ly",
"id": 72062217,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72062217?v=4",
"html_url": "https:\/\/github.com\/absholi7ly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/absholi7ly\/CVE-2025-6218-WinRAR-Directory-Traversal-RCE",
"description": "CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction directory when a user extracts a specially crafted",
"fork": false,
"created_at": "2025-07-10T01:37:39Z",
"updated_at": "2025-12-17T13:42:57Z",
"pushed_at": "2025-07-10T02:31:38Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 11,
"score": 0,
"subscribers_count": 0
},
{
"id": 1116740760,
"name": "CVE-2025-6218-WinRAR-RCE-POC",
"full_name": "Chrxstxqn\/CVE-2025-6218-WinRAR-RCE-POC",
"owner": {
"login": "Chrxstxqn",
"id": 137430908,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137430908?v=4",
"html_url": "https:\/\/github.com\/Chrxstxqn",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Chrxstxqn\/CVE-2025-6218-WinRAR-RCE-POC",
"description": "Comprehensive analysis and proof-of-concept for CVE-2025-6218 - WinRAR path traversal RCE vulnerability affecting versions 7.11 and earlier",
"fork": false,
"created_at": "2025-12-15T10:08:35Z",
"updated_at": "2025-12-17T09:52:47Z",
"pushed_at": "2025-12-15T11:30:35Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 1117365012,
"name": "sigma-rules",
"full_name": "Hatchepsoute\/sigma-rules",
"owner": {
"login": "Hatchepsoute",
"id": 72807820,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72807820?v=4",
"html_url": "https:\/\/github.com\/Hatchepsoute",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Hatchepsoute\/sigma-rules",
"description": "Ce dépôt fournit des règles Sigma prêtes pour la production afin de détecter lexploitation de la vulnérabilité CVE-2025-6218 affectant WinRAR sous Windows.",
"fork": false,
"created_at": "2025-12-16T08:01:06Z",
"updated_at": "2025-12-18T15:47:40Z",
"pushed_at": "2025-12-18T17:35:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]