PoC-in-GitHub/2024/CVE-2024-21534.json

106 lines
3.8 KiB
JSON
Raw Normal View History

2025-01-15 15:32:14 +09:00
[
{
"id": 887743822,
"name": "CVE-2024-21534",
"full_name": "pabloopez\/CVE-2024-21534",
"owner": {
"login": "pabloopez",
"id": 56795889,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56795889?v=4",
"html_url": "https:\/\/github.com\/pabloopez",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pabloopez\/CVE-2024-21534",
"description": "Proof-of-concept (PoC) exploit for JSONPath-plus vulnerability",
"fork": false,
"created_at": "2024-11-13T07:56:10Z",
"updated_at": "2024-11-27T08:01:39Z",
"pushed_at": "2024-11-27T08:01:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 892949211,
"name": "cve-2024-21534-poc",
"full_name": "XiaomingX\/cve-2024-21534-poc",
"owner": {
"login": "XiaomingX",
"id": 5387930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-21534-poc",
"description": "jsonpath-plus 包(版本 <=10.0.7存在严重的远程代码执行RCE漏洞允许攻击者通过 Node.js 的 VM 模块执行任意代码。该漏洞由于输入验证不严格导致,影响版本为 10.0.7 以下CVSS 分数为 9.8(极其严重)。漏洞首次公开于 2024 年 10 月 11 日。",
"fork": false,
"created_at": "2024-11-23T05:54:24Z",
"updated_at": "2025-01-13T18:17:27Z",
"pushed_at": "2024-11-23T05:57:35Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exp",
"poc",
"rce"
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 895697212,
"name": "cve-2024-21534",
"full_name": "verylazytech\/cve-2024-21534",
"owner": {
"login": "verylazytech",
"id": 172168670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
"html_url": "https:\/\/github.com\/verylazytech",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/verylazytech\/cve-2024-21534",
"description": "POC - CVE-2024-21534 Jsonpath-plus vulnerable to Remote Code Execution (RCE) due to improper input sanitization",
"fork": false,
"created_at": "2024-11-28T17:47:53Z",
"updated_at": "2025-01-12T18:33:09Z",
"pushed_at": "2024-11-28T18:07:14Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-21534",
"jsonpath",
"rce",
"rce-exploit",
"remote-code-execution",
"sanitization"
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}
]