PoC-in-GitHub/2024/CVE-2024-38998.json

33 lines
1.3 KiB
JSON
Raw Normal View History

2024-12-13 09:32:02 +09:00
[
{
"id": 902615056,
"name": "PP_CVE-2024-38998",
2024-12-17 03:32:52 +09:00
"full_name": "z3ldr1\/PP_CVE-2024-38998",
2024-12-13 09:32:02 +09:00
"owner": {
2024-12-17 03:32:52 +09:00
"login": "z3ldr1",
2024-12-13 09:32:02 +09:00
"id": 128452420,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128452420?v=4",
2024-12-17 03:32:52 +09:00
"html_url": "https:\/\/github.com\/z3ldr1",
2024-12-13 09:32:02 +09:00
"user_view_type": "public"
},
2024-12-17 03:32:52 +09:00
"html_url": "https:\/\/github.com\/z3ldr1\/PP_CVE-2024-38998",
2024-12-13 09:32:02 +09:00
"description": "Uma vulnerabilidade (CVE-2024-38998) foi identificada na versão 2.3.6 do módulo JavaScript requirejs. Ela explora prototype pollution na função config, permitindo que invasores modifiquem Object.prototype com entradas maliciosas. Isso pode causar DoS, execução remota de código (RCE) ou XSS. A gravidade é crítica (CVSS 9.8). ",
"fork": false,
"created_at": "2024-12-12T23:19:44Z",
2024-12-20 15:31:40 +09:00
"updated_at": "2024-12-20T00:37:10Z",
2024-12-13 09:32:02 +09:00
"pushed_at": "2024-12-12T23:20:56Z",
2024-12-20 15:31:40 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2024-12-13 09:32:02 +09:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2024-12-20 15:31:40 +09:00
"watchers": 1,
2024-12-13 09:32:02 +09:00
"score": 0,
2024-12-13 15:32:23 +09:00
"subscribers_count": 1
2024-12-13 09:32:02 +09:00
}
]