PoC-in-GitHub/2024/CVE-2024-24590.json
2024-06-14 09:29:10 +09:00

122 lines
No EOL
4.3 KiB
JSON

[
{
"id": 813761890,
"name": "ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-",
"full_name": "LordVileOnX\/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-",
"owner": {
"login": "LordVileOnX",
"id": 172425960,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172425960?v=4",
"html_url": "https:\/\/github.com\/LordVileOnX"
},
"html_url": "https:\/\/github.com\/LordVileOnX\/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-",
"description": "Here is an exploit in python to exploit the CVE-2024-24590, which is an upload pickle in a ClearML, which leads to arbitrary code execution... Enjoy :D",
"fork": false,
"created_at": "2024-06-11T17:33:36Z",
"updated_at": "2024-06-13T19:24:17Z",
"pushed_at": "2024-06-11T23:10:10Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 813864710,
"name": "ClearML-CVE-2024-24590",
"full_name": "OxyDeV2\/ClearML-CVE-2024-24590",
"owner": {
"login": "OxyDeV2",
"id": 46215222,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46215222?v=4",
"html_url": "https:\/\/github.com\/OxyDeV2"
},
"html_url": "https:\/\/github.com\/OxyDeV2\/ClearML-CVE-2024-24590",
"description": "Proof of concept for CVE-2024-24590",
"fork": false,
"created_at": "2024-06-11T22:30:26Z",
"updated_at": "2024-06-13T22:30:19Z",
"pushed_at": "2024-06-13T11:33:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 814218929,
"name": "CVE-2024-24590",
"full_name": "DemonPandaz2763\/CVE-2024-24590",
"owner": {
"login": "DemonPandaz2763",
"id": 69938676,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69938676?v=4",
"html_url": "https:\/\/github.com\/DemonPandaz2763"
},
"html_url": "https:\/\/github.com\/DemonPandaz2763\/CVE-2024-24590",
"description": "Another CVE-2024-24590 poc",
"fork": false,
"created_at": "2024-06-12T15:07:46Z",
"updated_at": "2024-06-12T15:12:54Z",
"pushed_at": "2024-06-12T15:12:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 814871568,
"name": "CVE-2024-24590-ClearML-RCE-Exploit",
"full_name": "xffsec\/CVE-2024-24590-ClearML-RCE-Exploit",
"owner": {
"login": "xffsec",
"id": 162821824,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162821824?v=4",
"html_url": "https:\/\/github.com\/xffsec"
},
"html_url": "https:\/\/github.com\/xffsec\/CVE-2024-24590-ClearML-RCE-Exploit",
"description": null,
"fork": false,
"created_at": "2024-06-13T22:17:57Z",
"updated_at": "2024-06-14T00:16:10Z",
"pushed_at": "2024-06-13T22:20:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]