PoC-in-GitHub/2024/CVE-2024-24590.json
2024-06-12 09:29:24 +09:00

62 lines
No EOL
2.3 KiB
JSON

[
{
"id": 813761890,
"name": "ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-",
"full_name": "LordVileOnX\/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-",
"owner": {
"login": "LordVileOnX",
"id": 172425960,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172425960?v=4",
"html_url": "https:\/\/github.com\/LordVileOnX"
},
"html_url": "https:\/\/github.com\/LordVileOnX\/ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-",
"description": "Here is an exploit in python to exploit the CVE-2024-24590, which is an upload pickle in a ClearML, which leads to arbitrary code execution... Enjoy :D",
"fork": false,
"created_at": "2024-06-11T17:33:36Z",
"updated_at": "2024-06-11T23:50:49Z",
"pushed_at": "2024-06-11T23:10:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 813864710,
"name": "PoC-CVE-2024-24590",
"full_name": "OxyDeV2\/PoC-CVE-2024-24590",
"owner": {
"login": "OxyDeV2",
"id": 46215222,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46215222?v=4",
"html_url": "https:\/\/github.com\/OxyDeV2"
},
"html_url": "https:\/\/github.com\/OxyDeV2\/PoC-CVE-2024-24590",
"description": "Proof of concept for CVE-2024-24590",
"fork": false,
"created_at": "2024-06-11T22:30:26Z",
"updated_at": "2024-06-11T22:39:34Z",
"pushed_at": "2024-06-11T22:37:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]