[ { "id": 887743822, "name": "CVE-2024-21534", "full_name": "pabloopez\/CVE-2024-21534", "owner": { "login": "pabloopez", "id": 56795889, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56795889?v=4", "html_url": "https:\/\/github.com\/pabloopez", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pabloopez\/CVE-2024-21534", "description": "Proof-of-concept (PoC) exploit for JSONPath-plus vulnerability", "fork": false, "created_at": "2024-11-13T07:56:10Z", "updated_at": "2024-11-27T08:01:39Z", "pushed_at": "2024-11-27T08:01:35Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 892949211, "name": "cve-2024-21534-poc", "full_name": "XiaomingX\/cve-2024-21534-poc", "owner": { "login": "XiaomingX", "id": 5387930, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", "html_url": "https:\/\/github.com\/XiaomingX", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-21534-poc", "description": "jsonpath-plus 包(版本 <=10.0.7)存在严重的远程代码执行(RCE)漏洞,允许攻击者通过 Node.js 的 VM 模块执行任意代码。该漏洞由于输入验证不严格导致,影响版本为 10.0.7 以下,CVSS 分数为 9.8(极其严重)。漏洞首次公开于 2024 年 10 月 11 日。", "fork": false, "created_at": "2024-11-23T05:54:24Z", "updated_at": "2025-01-13T18:17:27Z", "pushed_at": "2024-11-23T05:57:35Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "exp", "poc", "rce" ], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 895697212, "name": "cve-2024-21534", "full_name": "verylazytech\/cve-2024-21534", "owner": { "login": "verylazytech", "id": 172168670, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4", "html_url": "https:\/\/github.com\/verylazytech", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/verylazytech\/cve-2024-21534", "description": "POC - CVE-2024-21534 Jsonpath-plus vulnerable to Remote Code Execution (RCE) due to improper input sanitization", "fork": false, "created_at": "2024-11-28T17:47:53Z", "updated_at": "2025-01-12T18:33:09Z", "pushed_at": "2024-11-28T18:07:14Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2024-21534", "jsonpath", "rce", "rce-exploit", "remote-code-execution", "sanitization" ], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 1 } ]