PoC-in-GitHub/2024/CVE-2024-41713.json
2025-01-15 15:32:14 +09:00

126 lines
No EOL
4.9 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 898839903,
"name": "Mitel-MiCollab-Auth-Bypass_CVE-2024-41713",
"full_name": "watchtowrlabs\/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713",
"owner": {
"login": "watchtowrlabs",
"id": 99977116,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99977116?v=4",
"html_url": "https:\/\/github.com\/watchtowrlabs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/watchtowrlabs\/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713",
"description": null,
"fork": false,
"created_at": "2024-12-05T06:13:57Z",
"updated_at": "2025-01-13T07:40:10Z",
"pushed_at": "2024-12-05T07:55:04Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},
{
"id": 906475087,
"name": "CVE-2024-41713POC",
"full_name": "zxj-hub\/CVE-2024-41713POC",
"owner": {
"login": "zxj-hub",
"id": 192207002,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192207002?v=4",
"html_url": "https:\/\/github.com\/zxj-hub",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zxj-hub\/CVE-2024-41713POC",
"description": "Mitel MiCollab 企业协作平台 任意文件读取漏洞(CVE-2024-41713)由于Mitel MiCollab软件的 NuPoint 统一消息 (NPM) 组件中存在身份验证绕过漏洞并且输入验证不足未经身份验证的远程攻击者可利用该漏洞执行路径遍历攻击成功利用可能导致未授权访问、破坏或删除用户的数据和系统配置。影响范围version < MiCollab 9.8 SP2 (9.8.2.12)",
"fork": false,
"created_at": "2024-12-21T02:26:26Z",
"updated_at": "2024-12-21T02:28:26Z",
"pushed_at": "2024-12-21T02:28:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 906575821,
"name": "cve-2024-CVE-2024-41713",
"full_name": "Sanandd\/cve-2024-CVE-2024-41713",
"owner": {
"login": "Sanandd",
"id": 192220387,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192220387?v=4",
"html_url": "https:\/\/github.com\/Sanandd",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Sanandd\/cve-2024-CVE-2024-41713",
"description": "cve-2024-CVE-2024-41713",
"fork": false,
"created_at": "2024-12-21T09:35:12Z",
"updated_at": "2024-12-21T09:36:20Z",
"pushed_at": "2024-12-21T09:36:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 915117254,
"name": "CVE-2024-41713-Scan",
"full_name": "amanverma-wsu\/CVE-2024-41713-Scan",
"owner": {
"login": "amanverma-wsu",
"id": 146479253,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146479253?v=4",
"html_url": "https:\/\/github.com\/amanverma-wsu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/amanverma-wsu\/CVE-2024-41713-Scan",
"description": "A Python script to detect CVE-2024-41713, a directory traversal vulnerability in Apache HTTP Server, enabling unauthorized access to restricted resources. This tool is for educational purposes and authorized testing only. Unauthorized usage is unethical and illegal.",
"fork": false,
"created_at": "2025-01-11T02:39:36Z",
"updated_at": "2025-01-11T02:46:25Z",
"pushed_at": "2025-01-11T02:46:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]