PoC-in-GitHub/2024/CVE-2024-37084.json
2025-01-15 15:32:14 +09:00

162 lines
No EOL
5.6 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 855311249,
"name": "CVE-2024-37084-Poc",
"full_name": "Kayiyan\/CVE-2024-37084-Poc",
"owner": {
"login": "Kayiyan",
"id": 126185640,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/126185640?v=4",
"html_url": "https:\/\/github.com\/Kayiyan",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Kayiyan\/CVE-2024-37084-Poc",
"description": "Analysis , Demo exploit and poc about CVE-2024-37084",
"fork": false,
"created_at": "2024-09-10T16:58:54Z",
"updated_at": "2024-11-20T18:27:41Z",
"pushed_at": "2024-09-24T02:41:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 855821849,
"name": "CVE-2024-37084",
"full_name": "vuhz\/CVE-2024-37084",
"owner": {
"login": "vuhz",
"id": 90823042,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90823042?v=4",
"html_url": "https:\/\/github.com\/vuhz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/vuhz\/CVE-2024-37084",
"description": "Spring Cloud Remote Code Execution",
"fork": false,
"created_at": "2024-09-11T14:09:50Z",
"updated_at": "2024-09-13T03:21:50Z",
"pushed_at": "2024-09-11T14:12:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 872838076,
"name": "CVE-2024-37084-Exp",
"full_name": "Ly4j\/CVE-2024-37084-Exp",
"owner": {
"login": "Ly4j",
"id": 73785589,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73785589?v=4",
"html_url": "https:\/\/github.com\/Ly4j",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Ly4j\/CVE-2024-37084-Exp",
"description": "Spring Cloud Data Flow CVE-2024-37084 exp",
"fork": false,
"created_at": "2024-10-15T06:55:05Z",
"updated_at": "2025-01-12T18:27:27Z",
"pushed_at": "2024-10-16T02:27:53Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 873195770,
"name": "CVE-2024-37084-Exp",
"full_name": "A0be\/CVE-2024-37084-Exp",
"owner": {
"login": "A0be",
"id": 184107161,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184107161?v=4",
"html_url": "https:\/\/github.com\/A0be",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/A0be\/CVE-2024-37084-Exp",
"description": "Spring Cloud Data Flow CVE-2024-37084 exp",
"fork": false,
"created_at": "2024-10-15T18:54:25Z",
"updated_at": "2024-10-15T19:09:22Z",
"pushed_at": "2024-10-15T18:56:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 892641642,
"name": "cve-2024-37084-Poc",
"full_name": "XiaomingX\/cve-2024-37084-Poc",
"owner": {
"login": "XiaomingX",
"id": 5387930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-37084-Poc",
"description": "CVE-2024-37084是Spring Cloud Data Flow中的一个高危漏洞影响版本为2.11.0至2.11.3。该漏洞允许具有Skipper服务器API访问权限的攻击者通过精心构造的上传请求将任意文件写入服务器文件系统的任意位置进而可能导致远程代码执行严重威胁服务器安全。",
"fork": false,
"created_at": "2024-11-22T13:53:42Z",
"updated_at": "2025-01-13T18:17:48Z",
"pushed_at": "2024-11-22T14:02:35Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"exp",
"poc",
"rce"
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}
]