PoC-in-GitHub/2024/CVE-2024-48990.json
2024-11-25 03:34:43 +09:00

188 lines
No EOL
6.6 KiB
JSON

[
{
"id": 891671184,
"name": "CVE-2024-48990-PoC",
"full_name": "makuga01\/CVE-2024-48990-PoC",
"owner": {
"login": "makuga01",
"id": 20490978,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20490978?v=4",
"html_url": "https:\/\/github.com\/makuga01",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/makuga01\/CVE-2024-48990-PoC",
"description": "PoC for CVE-2024-48990",
"fork": false,
"created_at": "2024-11-20T18:41:25Z",
"updated_at": "2024-11-24T18:00:36Z",
"pushed_at": "2024-11-20T18:49:33Z",
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 58,
"score": 0,
"subscribers_count": 1
},
{
"id": 892345016,
"name": "CVE-2024-48990",
"full_name": "ns989\/CVE-2024-48990",
"owner": {
"login": "ns989",
"id": 75913553,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75913553?v=4",
"html_url": "https:\/\/github.com\/ns989",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ns989\/CVE-2024-48990",
"description": "Exploit for CVE-2024-48990 (Local Privilege Escalation in needrestart < 3.8)",
"fork": false,
"created_at": "2024-11-21T23:59:49Z",
"updated_at": "2024-11-22T01:17:03Z",
"pushed_at": "2024-11-22T01:17:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 892744239,
"name": "CVE-2024-48990",
"full_name": "felmoltor\/CVE-2024-48990",
"owner": {
"login": "felmoltor",
"id": 846513,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/846513?v=4",
"html_url": "https:\/\/github.com\/felmoltor",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/felmoltor\/CVE-2024-48990",
"description": "Qualys needsrestart vulnerability CVE-2024-48990",
"fork": false,
"created_at": "2024-11-22T17:35:58Z",
"updated_at": "2024-11-22T18:32:05Z",
"pushed_at": "2024-11-22T17:41:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 893279532,
"name": "CVE-2024-48990-PoC",
"full_name": "Cyb3rFr0g\/CVE-2024-48990-PoC",
"owner": {
"login": "Cyb3rFr0g",
"id": 65209938,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65209938?v=4",
"html_url": "https:\/\/github.com\/Cyb3rFr0g",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Cyb3rFr0g\/CVE-2024-48990-PoC",
"description": "My take on the needrestart Python CVE-2024-48990",
"fork": false,
"created_at": "2024-11-24T02:12:36Z",
"updated_at": "2024-11-24T02:32:57Z",
"pushed_at": "2024-11-24T02:32:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 893347321,
"name": "CVE-2024-48990-PoC-Testing",
"full_name": "pentestfunctions\/CVE-2024-48990-PoC-Testing",
"owner": {
"login": "pentestfunctions",
"id": 144001335,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144001335?v=4",
"html_url": "https:\/\/github.com\/pentestfunctions",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pentestfunctions\/CVE-2024-48990-PoC-Testing",
"description": "Testing POC for use cases",
"fork": false,
"created_at": "2024-11-24T07:33:06Z",
"updated_at": "2024-11-24T07:56:52Z",
"pushed_at": "2024-11-24T07:56:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 893500783,
"name": "CVE-2024-48990-exploit",
"full_name": "r0xdeadbeef\/CVE-2024-48990-exploit",
"owner": {
"login": "r0xdeadbeef",
"id": 65211256,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4",
"html_url": "https:\/\/github.com\/r0xdeadbeef",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/r0xdeadbeef\/CVE-2024-48990-exploit",
"description": "Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.",
"fork": false,
"created_at": "2024-11-24T15:57:45Z",
"updated_at": "2024-11-24T17:47:05Z",
"pushed_at": "2024-11-24T17:47:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]