mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
106 lines
3.8 KiB
JSON
106 lines
3.8 KiB
JSON
|
[
|
|||
|
{
|
|||
|
"id": 887743822,
|
|||
|
"name": "CVE-2024-21534",
|
|||
|
"full_name": "pabloopez\/CVE-2024-21534",
|
|||
|
"owner": {
|
|||
|
"login": "pabloopez",
|
|||
|
"id": 56795889,
|
|||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56795889?v=4",
|
|||
|
"html_url": "https:\/\/github.com\/pabloopez",
|
|||
|
"user_view_type": "public"
|
|||
|
},
|
|||
|
"html_url": "https:\/\/github.com\/pabloopez\/CVE-2024-21534",
|
|||
|
"description": "Proof-of-concept (PoC) exploit for JSONPath-plus vulnerability",
|
|||
|
"fork": false,
|
|||
|
"created_at": "2024-11-13T07:56:10Z",
|
|||
|
"updated_at": "2024-11-27T08:01:39Z",
|
|||
|
"pushed_at": "2024-11-27T08:01:35Z",
|
|||
|
"stargazers_count": 1,
|
|||
|
"watchers_count": 1,
|
|||
|
"has_discussions": false,
|
|||
|
"forks_count": 1,
|
|||
|
"allow_forking": true,
|
|||
|
"is_template": false,
|
|||
|
"web_commit_signoff_required": false,
|
|||
|
"topics": [],
|
|||
|
"visibility": "public",
|
|||
|
"forks": 1,
|
|||
|
"watchers": 1,
|
|||
|
"score": 0,
|
|||
|
"subscribers_count": 1
|
|||
|
},
|
|||
|
{
|
|||
|
"id": 892949211,
|
|||
|
"name": "cve-2024-21534-poc",
|
|||
|
"full_name": "XiaomingX\/cve-2024-21534-poc",
|
|||
|
"owner": {
|
|||
|
"login": "XiaomingX",
|
|||
|
"id": 5387930,
|
|||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
|
|||
|
"html_url": "https:\/\/github.com\/XiaomingX",
|
|||
|
"user_view_type": "public"
|
|||
|
},
|
|||
|
"html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-21534-poc",
|
|||
|
"description": "jsonpath-plus 包(版本 <=10.0.7)存在严重的远程代码执行(RCE)漏洞,允许攻击者通过 Node.js 的 VM 模块执行任意代码。该漏洞由于输入验证不严格导致,影响版本为 10.0.7 以下,CVSS 分数为 9.8(极其严重)。漏洞首次公开于 2024 年 10 月 11 日。",
|
|||
|
"fork": false,
|
|||
|
"created_at": "2024-11-23T05:54:24Z",
|
|||
|
"updated_at": "2025-01-13T18:17:27Z",
|
|||
|
"pushed_at": "2024-11-23T05:57:35Z",
|
|||
|
"stargazers_count": 4,
|
|||
|
"watchers_count": 4,
|
|||
|
"has_discussions": false,
|
|||
|
"forks_count": 1,
|
|||
|
"allow_forking": true,
|
|||
|
"is_template": false,
|
|||
|
"web_commit_signoff_required": false,
|
|||
|
"topics": [
|
|||
|
"exp",
|
|||
|
"poc",
|
|||
|
"rce"
|
|||
|
],
|
|||
|
"visibility": "public",
|
|||
|
"forks": 1,
|
|||
|
"watchers": 4,
|
|||
|
"score": 0,
|
|||
|
"subscribers_count": 1
|
|||
|
},
|
|||
|
{
|
|||
|
"id": 895697212,
|
|||
|
"name": "cve-2024-21534",
|
|||
|
"full_name": "verylazytech\/cve-2024-21534",
|
|||
|
"owner": {
|
|||
|
"login": "verylazytech",
|
|||
|
"id": 172168670,
|
|||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
|
|||
|
"html_url": "https:\/\/github.com\/verylazytech",
|
|||
|
"user_view_type": "public"
|
|||
|
},
|
|||
|
"html_url": "https:\/\/github.com\/verylazytech\/cve-2024-21534",
|
|||
|
"description": "POC - CVE-2024-21534 Jsonpath-plus vulnerable to Remote Code Execution (RCE) due to improper input sanitization",
|
|||
|
"fork": false,
|
|||
|
"created_at": "2024-11-28T17:47:53Z",
|
|||
|
"updated_at": "2025-01-12T18:33:09Z",
|
|||
|
"pushed_at": "2024-11-28T18:07:14Z",
|
|||
|
"stargazers_count": 4,
|
|||
|
"watchers_count": 4,
|
|||
|
"has_discussions": false,
|
|||
|
"forks_count": 1,
|
|||
|
"allow_forking": true,
|
|||
|
"is_template": false,
|
|||
|
"web_commit_signoff_required": false,
|
|||
|
"topics": [
|
|||
|
"cve-2024-21534",
|
|||
|
"jsonpath",
|
|||
|
"rce",
|
|||
|
"rce-exploit",
|
|||
|
"remote-code-execution",
|
|||
|
"sanitization"
|
|||
|
],
|
|||
|
"visibility": "public",
|
|||
|
"forks": 1,
|
|||
|
"watchers": 4,
|
|||
|
"score": 0,
|
|||
|
"subscribers_count": 1
|
|||
|
}
|
|||
|
]
|