mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
33 lines
No EOL
1.3 KiB
JSON
33 lines
No EOL
1.3 KiB
JSON
[
|
|
{
|
|
"id": 902615056,
|
|
"name": "PP_CVE-2024-38998",
|
|
"full_name": "z3ldr1\/PP_CVE-2024-38998",
|
|
"owner": {
|
|
"login": "z3ldr1",
|
|
"id": 128452420,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128452420?v=4",
|
|
"html_url": "https:\/\/github.com\/z3ldr1",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/z3ldr1\/PP_CVE-2024-38998",
|
|
"description": "Uma vulnerabilidade (CVE-2024-38998) foi identificada na versão 2.3.6 do módulo JavaScript requirejs. Ela explora prototype pollution na função config, permitindo que invasores modifiquem Object.prototype com entradas maliciosas. Isso pode causar DoS, execução remota de código (RCE) ou XSS. A gravidade é crítica (CVSS 9.8). ",
|
|
"fork": false,
|
|
"created_at": "2024-12-12T23:19:44Z",
|
|
"updated_at": "2024-12-20T00:37:10Z",
|
|
"pushed_at": "2024-12-12T23:20:56Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |