mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
106 lines
No EOL
3.8 KiB
JSON
106 lines
No EOL
3.8 KiB
JSON
[
|
||
{
|
||
"id": 887743822,
|
||
"name": "CVE-2024-21534",
|
||
"full_name": "pabloopez\/CVE-2024-21534",
|
||
"owner": {
|
||
"login": "pabloopez",
|
||
"id": 56795889,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56795889?v=4",
|
||
"html_url": "https:\/\/github.com\/pabloopez",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/pabloopez\/CVE-2024-21534",
|
||
"description": "Proof-of-concept (PoC) exploit for JSONPath-plus vulnerability",
|
||
"fork": false,
|
||
"created_at": "2024-11-13T07:56:10Z",
|
||
"updated_at": "2024-11-27T08:01:39Z",
|
||
"pushed_at": "2024-11-27T08:01:35Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 892949211,
|
||
"name": "cve-2024-21534-poc",
|
||
"full_name": "XiaomingX\/cve-2024-21534-poc",
|
||
"owner": {
|
||
"login": "XiaomingX",
|
||
"id": 5387930,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
|
||
"html_url": "https:\/\/github.com\/XiaomingX",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-21534-poc",
|
||
"description": "jsonpath-plus 包(版本 <=10.0.7)存在严重的远程代码执行(RCE)漏洞,允许攻击者通过 Node.js 的 VM 模块执行任意代码。该漏洞由于输入验证不严格导致,影响版本为 10.0.7 以下,CVSS 分数为 9.8(极其严重)。漏洞首次公开于 2024 年 10 月 11 日。",
|
||
"fork": false,
|
||
"created_at": "2024-11-23T05:54:24Z",
|
||
"updated_at": "2025-01-13T18:17:27Z",
|
||
"pushed_at": "2024-11-23T05:57:35Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"exp",
|
||
"poc",
|
||
"rce"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 4,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 895697212,
|
||
"name": "cve-2024-21534",
|
||
"full_name": "verylazytech\/cve-2024-21534",
|
||
"owner": {
|
||
"login": "verylazytech",
|
||
"id": 172168670,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
|
||
"html_url": "https:\/\/github.com\/verylazytech",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/verylazytech\/cve-2024-21534",
|
||
"description": "POC - CVE-2024-21534 Jsonpath-plus vulnerable to Remote Code Execution (RCE) due to improper input sanitization",
|
||
"fork": false,
|
||
"created_at": "2024-11-28T17:47:53Z",
|
||
"updated_at": "2025-01-12T18:33:09Z",
|
||
"pushed_at": "2024-11-28T18:07:14Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2024-21534",
|
||
"jsonpath",
|
||
"rce",
|
||
"rce-exploit",
|
||
"remote-code-execution",
|
||
"sanitization"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 4,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
}
|
||
] |