mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
98 lines
No EOL
3.4 KiB
JSON
98 lines
No EOL
3.4 KiB
JSON
[
|
||
{
|
||
"id": 881591080,
|
||
"name": "CVE-2024-51567",
|
||
"full_name": "ajayalf\/CVE-2024-51567",
|
||
"owner": {
|
||
"login": "ajayalf",
|
||
"id": 49350537,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49350537?v=4",
|
||
"html_url": "https:\/\/github.com\/ajayalf",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ajayalf\/CVE-2024-51567",
|
||
"description": "CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections.",
|
||
"fork": false,
|
||
"created_at": "2024-10-31T21:55:57Z",
|
||
"updated_at": "2025-01-12T18:29:33Z",
|
||
"pushed_at": "2024-11-01T10:48:42Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2024-51567",
|
||
"cyberpanel"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 4,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 884847468,
|
||
"name": "CVE-2024-51567-RCE-EXPLOIT",
|
||
"full_name": "thehash007\/CVE-2024-51567-RCE-EXPLOIT",
|
||
"owner": {
|
||
"login": "thehash007",
|
||
"id": 108442682,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108442682?v=4",
|
||
"html_url": "https:\/\/github.com\/thehash007",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/thehash007\/CVE-2024-51567-RCE-EXPLOIT",
|
||
"description": "cbyerpanel rce exploit",
|
||
"fork": false,
|
||
"created_at": "2024-11-07T13:52:37Z",
|
||
"updated_at": "2024-12-28T21:06:32Z",
|
||
"pushed_at": "2024-11-07T13:57:25Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 894240840,
|
||
"name": "cve-2024-51567-poc",
|
||
"full_name": "XiaomingX\/cve-2024-51567-poc",
|
||
"owner": {
|
||
"login": "XiaomingX",
|
||
"id": 5387930,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
|
||
"html_url": "https:\/\/github.com\/XiaomingX",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-51567-poc",
|
||
"description": "CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections.",
|
||
"fork": false,
|
||
"created_at": "2024-11-26T02:18:24Z",
|
||
"updated_at": "2025-01-13T18:16:45Z",
|
||
"pushed_at": "2024-11-26T02:21:21Z",
|
||
"stargazers_count": 7,
|
||
"watchers_count": 7,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 7,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
}
|
||
] |