PoC-in-GitHub/2024/CVE-2024-28397.json
2025-09-01 03:36:31 +09:00

188 lines
No EOL
6.8 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 817083025,
"name": "CVE-2024-28397-js2py-Sandbox-Escape",
"full_name": "Marven11\/CVE-2024-28397-js2py-Sandbox-Escape",
"owner": {
"login": "Marven11",
"id": 110723864,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110723864?v=4",
"html_url": "https:\/\/github.com\/Marven11",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Marven11\/CVE-2024-28397-js2py-Sandbox-Escape",
"description": "CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.",
"fork": false,
"created_at": "2024-06-19T01:46:33Z",
"updated_at": "2025-08-31T17:40:30Z",
"pushed_at": "2025-08-28T10:16:03Z",
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 54,
"score": 0,
"subscribers_count": 2
},
{
"id": 818088894,
"name": "CVE-2024-28397-js2py-Sandbox-Escape",
"full_name": "CYBER-WARRIOR-SEC\/CVE-2024-28397-js2py-Sandbox-Escape",
"owner": {
"login": "CYBER-WARRIOR-SEC",
"id": 168237449,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168237449?v=4",
"html_url": "https:\/\/github.com\/CYBER-WARRIOR-SEC",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/CYBER-WARRIOR-SEC\/CVE-2024-28397-js2py-Sandbox-Escape",
"description": null,
"fork": false,
"created_at": "2024-06-21T04:43:21Z",
"updated_at": "2024-06-29T21:42:12Z",
"pushed_at": "2024-06-29T21:42:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 1039364261,
"name": "CVE-2024-28397-command-execution-poc",
"full_name": "waleed-hassan569\/CVE-2024-28397-command-execution-poc",
"owner": {
"login": "waleed-hassan569",
"id": 101213166,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101213166?v=4",
"html_url": "https:\/\/github.com\/waleed-hassan569",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/waleed-hassan569\/CVE-2024-28397-command-execution-poc",
"description": "This vulnerability arises from incomplete sandboxing in js2py, where crafted JavaScript can traverse Pythons internal object model and access dangerous classes like subprocess.Popen, leading to arbitrary command execution.",
"fork": false,
"created_at": "2025-08-17T04:00:59Z",
"updated_at": "2025-08-25T03:21:35Z",
"pushed_at": "2025-08-17T04:10:54Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},
{
"id": 1039784105,
"name": "exploit-js2py",
"full_name": "releaseown\/exploit-js2py",
"owner": {
"login": "releaseown",
"id": 226413267,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/226413267?v=4",
"html_url": "https:\/\/github.com\/releaseown",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/releaseown\/exploit-js2py",
"description": "The CVE-2024-28397 vulnerability affects versions of js2py up to v0.74, a Python library that allows JavaScript code to be executed within the Python interpreter. ",
"fork": false,
"created_at": "2025-08-18T01:09:33Z",
"updated_at": "2025-08-30T00:25:16Z",
"pushed_at": "2025-08-22T15:43:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 1040192717,
"name": "CVE-2024-28397-RCE",
"full_name": "harutomo-jp\/CVE-2024-28397-RCE",
"owner": {
"login": "harutomo-jp",
"id": 139304582,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139304582?v=4",
"html_url": "https:\/\/github.com\/harutomo-jp",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/harutomo-jp\/CVE-2024-28397-RCE",
"description": null,
"fork": false,
"created_at": "2025-08-18T15:40:19Z",
"updated_at": "2025-08-20T13:27:01Z",
"pushed_at": "2025-08-18T15:49:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1046106441,
"name": "CVE-2024-28397-js2py-Sandbox-Escape",
"full_name": "Naved124\/CVE-2024-28397-js2py-Sandbox-Escape",
"owner": {
"login": "Naved124",
"id": 86107643,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86107643?v=4",
"html_url": "https:\/\/github.com\/Naved124",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Naved124\/CVE-2024-28397-js2py-Sandbox-Escape",
"description": null,
"fork": false,
"created_at": "2025-08-28T07:39:30Z",
"updated_at": "2025-08-28T15:19:52Z",
"pushed_at": "2025-08-28T15:19:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]