PoC-in-GitHub/2024/CVE-2024-38998.json

64 lines
2.4 KiB
JSON
Raw Permalink Normal View History

2025-01-15 07:32:14 +01:00
[
{
"id": 902615056,
"name": "PP_CVE-2024-38998",
"full_name": "z3ldr1\/PP_CVE-2024-38998",
"owner": {
"login": "z3ldr1",
"id": 128452420,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128452420?v=4",
"html_url": "https:\/\/github.com\/z3ldr1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/z3ldr1\/PP_CVE-2024-38998",
"description": "Uma vulnerabilidade (CVE-2024-38998) foi identificada na versão 2.3.6 do módulo JavaScript requirejs. Ela explora prototype pollution na função config, permitindo que invasores modifiquem Object.prototype com entradas maliciosas. Isso pode causar DoS, execução remota de código (RCE) ou XSS. A gravidade é crítica (CVSS 9.8). ",
"fork": false,
"created_at": "2024-12-12T23:19:44Z",
"updated_at": "2024-12-20T00:37:10Z",
"pushed_at": "2024-12-12T23:20:56Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 913713750,
"name": "PP_CVE-2024-38998",
"full_name": "cesarbtakeda\/PP_CVE-2024-38998",
"owner": {
"login": "cesarbtakeda",
"id": 114227831,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114227831?v=4",
"html_url": "https:\/\/github.com\/cesarbtakeda",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cesarbtakeda\/PP_CVE-2024-38998",
"description": null,
"fork": false,
"created_at": "2025-01-08T08:04:54Z",
"updated_at": "2025-01-08T08:13:26Z",
"pushed_at": "2025-01-08T08:13:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]