PoC-in-GitHub/2024/CVE-2024-21534.json
2025-01-15 15:32:14 +09:00

106 lines
No EOL
3.8 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 887743822,
"name": "CVE-2024-21534",
"full_name": "pabloopez\/CVE-2024-21534",
"owner": {
"login": "pabloopez",
"id": 56795889,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56795889?v=4",
"html_url": "https:\/\/github.com\/pabloopez",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pabloopez\/CVE-2024-21534",
"description": "Proof-of-concept (PoC) exploit for JSONPath-plus vulnerability",
"fork": false,
"created_at": "2024-11-13T07:56:10Z",
"updated_at": "2024-11-27T08:01:39Z",
"pushed_at": "2024-11-27T08:01:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 892949211,
"name": "cve-2024-21534-poc",
"full_name": "XiaomingX\/cve-2024-21534-poc",
"owner": {
"login": "XiaomingX",
"id": 5387930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-21534-poc",
"description": "jsonpath-plus 包(版本 <=10.0.7存在严重的远程代码执行RCE漏洞允许攻击者通过 Node.js 的 VM 模块执行任意代码。该漏洞由于输入验证不严格导致,影响版本为 10.0.7 以下CVSS 分数为 9.8(极其严重)。漏洞首次公开于 2024 年 10 月 11 日。",
"fork": false,
"created_at": "2024-11-23T05:54:24Z",
"updated_at": "2025-01-13T18:17:27Z",
"pushed_at": "2024-11-23T05:57:35Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exp",
"poc",
"rce"
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 895697212,
"name": "cve-2024-21534",
"full_name": "verylazytech\/cve-2024-21534",
"owner": {
"login": "verylazytech",
"id": 172168670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
"html_url": "https:\/\/github.com\/verylazytech",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/verylazytech\/cve-2024-21534",
"description": "POC - CVE-2024-21534 Jsonpath-plus vulnerable to Remote Code Execution (RCE) due to improper input sanitization",
"fork": false,
"created_at": "2024-11-28T17:47:53Z",
"updated_at": "2025-01-12T18:33:09Z",
"pushed_at": "2024-11-28T18:07:14Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-21534",
"jsonpath",
"rce",
"rce-exploit",
"remote-code-execution",
"sanitization"
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}
]