PoC-in-GitHub/2024/CVE-2024-21413.json
2025-11-27 03:43:38 +09:00

662 lines
No EOL
25 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 758191027,
"name": "CVE-2024-21413",
"full_name": "duy-31\/CVE-2024-21413",
"owner": {
"login": "duy-31",
"id": 20819326,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20819326?v=4",
"html_url": "https:\/\/github.com\/duy-31",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/duy-31\/CVE-2024-21413",
"description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC",
"fork": false,
"created_at": "2024-02-15T19:57:38Z",
"updated_at": "2025-11-10T02:14:16Z",
"pushed_at": "2024-02-17T07:08:49Z",
"stargazers_count": 156,
"watchers_count": 156,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 156,
"score": 0,
"subscribers_count": 2
},
{
"id": 758555813,
"name": "CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"full_name": "xaitax\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"owner": {
"login": "xaitax",
"id": 5014849,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5014849?v=4",
"html_url": "https:\/\/github.com\/xaitax",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xaitax\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2025-11-26T13:36:30Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 747,
"watchers_count": 747,
"has_discussions": false,
"forks_count": 160,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 160,
"watchers": 747,
"score": 0,
"subscribers_count": 9
},
{
"id": 758688293,
"name": "CVE-2024-21413-POC",
"full_name": "r00tb1t\/CVE-2024-21413-POC",
"owner": {
"login": "r00tb1t",
"id": 150359865,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150359865?v=4",
"html_url": "https:\/\/github.com\/r00tb1t",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/r00tb1t\/CVE-2024-21413-POC",
"description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - CVE-2024-21413 POC",
"fork": false,
"created_at": "2024-02-16T21:10:31Z",
"updated_at": "2024-07-23T13:37:41Z",
"pushed_at": "2024-02-16T22:23:37Z",
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 16,
"score": 0,
"subscribers_count": 1
},
{
"id": 758949379,
"name": "CVE-2024-21413",
"full_name": "CMNatic\/CVE-2024-21413",
"owner": {
"login": "CMNatic",
"id": 4163116,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4163116?v=4",
"html_url": "https:\/\/github.com\/CMNatic",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/CMNatic\/CVE-2024-21413",
"description": "CVE-2024-21413 PoC for THM Lab",
"fork": false,
"created_at": "2024-02-17T14:52:52Z",
"updated_at": "2025-11-26T00:47:17Z",
"pushed_at": "2024-03-13T02:44:28Z",
"stargazers_count": 174,
"watchers_count": 174,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 174,
"score": 0,
"subscribers_count": 2
},
{
"id": 759610035,
"name": "CVE-2024-21413",
"full_name": "MSeymenD\/CVE-2024-21413",
"owner": {
"login": "MSeymenD",
"id": 83572774,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83572774?v=4",
"html_url": "https:\/\/github.com\/MSeymenD",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MSeymenD\/CVE-2024-21413",
"description": "CVE-2024-21413 Açığını Kullanarak Giriş Bilgilerini Alma",
"fork": false,
"created_at": "2024-02-19T01:37:15Z",
"updated_at": "2024-02-19T01:48:46Z",
"pushed_at": "2024-02-19T01:54:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 760445057,
"name": "CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"full_name": "Mdusmandasthaheer\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"owner": {
"login": "Mdusmandasthaheer",
"id": 122736342,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122736342?v=4",
"html_url": "https:\/\/github.com\/Mdusmandasthaheer",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Mdusmandasthaheer\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"description": null,
"fork": false,
"created_at": "2024-02-20T12:41:15Z",
"updated_at": "2025-09-15T11:35:40Z",
"pushed_at": "2024-02-20T13:37:39Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 762261193,
"name": "CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"full_name": "ahmetkarakayaoffical\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"owner": {
"login": "ahmetkarakayaoffical",
"id": 100443477,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100443477?v=4",
"html_url": "https:\/\/github.com\/ahmetkarakayaoffical",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ahmetkarakayaoffical\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"description": "Bu betik, Microsoft Outlook'ta keşfedilen ve CVSS değeri 9.8 olan önemli bir güvenlik açığı olan CVE-2024-21413 için bir kavram kanıtı (PoC) sunmaktadır. MonikerLink hatası olarak adlandırılan bu güvenlik açığı, yerel NTLM bilgilerinin potansiyel sızıntısı ve uzaktan kod çalıştırma olasılığı dahil olmak üzere geniş kapsamlı etkilere sahiptir.",
"fork": false,
"created_at": "2024-02-23T12:13:11Z",
"updated_at": "2025-10-07T09:11:48Z",
"pushed_at": "2024-02-24T15:36:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 765116138,
"name": "CVE-2024-21413",
"full_name": "dshabani96\/CVE-2024-21413",
"owner": {
"login": "dshabani96",
"id": 107131685,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107131685?v=4",
"html_url": "https:\/\/github.com\/dshabani96",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dshabani96\/CVE-2024-21413",
"description": null,
"fork": false,
"created_at": "2024-02-29T10:07:34Z",
"updated_at": "2025-04-24T12:34:35Z",
"pushed_at": "2024-02-29T13:22:17Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 795596778,
"name": "CVE-2024-21413-Microsoft-Outlook-RCE-Exploit",
"full_name": "X-Projetion\/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit",
"owner": {
"login": "X-Projetion",
"id": 161194427,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161194427?v=4",
"html_url": "https:\/\/github.com\/X-Projetion",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/X-Projetion\/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit",
"description": "CVE-2024-21413 Microsoft Outlook RCE Exploit",
"fork": false,
"created_at": "2024-05-03T16:09:54Z",
"updated_at": "2024-11-06T05:33:54Z",
"pushed_at": "2024-05-03T16:11:46Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 799194864,
"name": "CVE-2024-21413",
"full_name": "th3Hellion\/CVE-2024-21413",
"owner": {
"login": "th3Hellion",
"id": 93284551,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93284551?v=4",
"html_url": "https:\/\/github.com\/th3Hellion",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/th3Hellion\/CVE-2024-21413",
"description": null,
"fork": false,
"created_at": "2024-05-11T12:28:22Z",
"updated_at": "2024-05-11T12:34:27Z",
"pushed_at": "2024-05-11T12:34:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 816689478,
"name": "CVE-2024-21413",
"full_name": "ShubhamKanhere307\/CVE-2024-21413",
"owner": {
"login": "ShubhamKanhere307",
"id": 173140854,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173140854?v=4",
"html_url": "https:\/\/github.com\/ShubhamKanhere307",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ShubhamKanhere307\/CVE-2024-21413",
"description": "This script is the Proof of Concept (PoC) of the CVE-2024-21413, a significant security vulnerability discovered in the Microsoft Windows Outlook having a strong 9.8 critical CVSS score. Named as #MonikerLink Bug, this vulnerability allows the attacker to execute the arbitrary code remotely on the victim's machine, thus becomes a full-fledged RCE. ",
"fork": false,
"created_at": "2024-06-18T08:11:33Z",
"updated_at": "2024-06-18T08:18:16Z",
"pushed_at": "2024-06-18T08:18:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 821343809,
"name": "CVE-2024-21413",
"full_name": "olebris\/CVE-2024-21413",
"owner": {
"login": "olebris",
"id": 78493240,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78493240?v=4",
"html_url": "https:\/\/github.com\/olebris",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/olebris\/CVE-2024-21413",
"description": "CVE-2024-21413 PoC",
"fork": false,
"created_at": "2024-06-28T10:27:34Z",
"updated_at": "2024-06-28T10:27:55Z",
"pushed_at": "2024-06-28T10:27:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823551343,
"name": "Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape",
"full_name": "Redfox-Security\/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape",
"owner": {
"login": "Redfox-Security",
"id": 173128884,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173128884?v=4",
"html_url": "https:\/\/github.com\/Redfox-Security",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Redfox-Security\/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape",
"description": null,
"fork": false,
"created_at": "2024-07-03T08:45:05Z",
"updated_at": "2024-07-03T08:45:08Z",
"pushed_at": "2024-07-03T08:45:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 850327133,
"name": "CVE-2024-21413",
"full_name": "ThemeHackers\/CVE-2024-21413",
"owner": {
"login": "ThemeHackers",
"id": 107047730,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107047730?v=4",
"html_url": "https:\/\/github.com\/ThemeHackers",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ThemeHackers\/CVE-2024-21413",
"description": "CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC",
"fork": false,
"created_at": "2024-08-31T13:18:43Z",
"updated_at": "2025-09-19T13:46:35Z",
"pushed_at": "2025-06-05T03:39:02Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},
{
"id": 898401287,
"name": "CVE-2024-21413-Vulnerabilidad-Outlook-LAB",
"full_name": "D1se0\/CVE-2024-21413-Vulnerabilidad-Outlook-LAB",
"owner": {
"login": "D1se0",
"id": 164921056,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164921056?v=4",
"html_url": "https:\/\/github.com\/D1se0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/D1se0\/CVE-2024-21413-Vulnerabilidad-Outlook-LAB",
"description": null,
"fork": false,
"created_at": "2024-12-04T10:26:37Z",
"updated_at": "2025-03-25T03:32:25Z",
"pushed_at": "2024-12-05T09:50:57Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cibersecurity",
"cve",
"cve-2024-21413",
"exploit",
"hacking",
"hacking-etico",
"lab",
"outlook"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 954971949,
"name": "Project-NTLM-Hash-Capture-and-Phishing-Email-Exploitation-for-CVE-2024-21413",
"full_name": "ArtemCyberLab\/Project-NTLM-Hash-Capture-and-Phishing-Email-Exploitation-for-CVE-2024-21413",
"owner": {
"login": "ArtemCyberLab",
"id": 193649833,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/193649833?v=4",
"html_url": "https:\/\/github.com\/ArtemCyberLab",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ArtemCyberLab\/Project-NTLM-Hash-Capture-and-Phishing-Email-Exploitation-for-CVE-2024-21413",
"description": "The project was created to demonstrate the use of various tools for capturing NTLM hashes from users on a network and for executing phishing attacks using email. This showcases how network authentication vulnerabilities and phishing methods can be exploited to compromise systems.",
"fork": false,
"created_at": "2025-03-25T22:49:05Z",
"updated_at": "2025-03-25T22:51:49Z",
"pushed_at": "2025-03-25T22:51:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 981389350,
"name": "CVE-2024-21413",
"full_name": "PolarisXSec\/CVE-2024-21413",
"owner": {
"login": "PolarisXSec",
"id": 210077807,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/210077807?v=4",
"html_url": "https:\/\/github.com\/PolarisXSec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/PolarisXSec\/CVE-2024-21413",
"description": null,
"fork": false,
"created_at": "2025-05-11T01:55:39Z",
"updated_at": "2025-05-11T02:49:20Z",
"pushed_at": "2025-05-11T02:27:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 993208444,
"name": "Moniker-Link-CVE-2024-21413",
"full_name": "MQKGitHub\/Moniker-Link-CVE-2024-21413",
"owner": {
"login": "MQKGitHub",
"id": 100727141,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100727141?v=4",
"html_url": "https:\/\/github.com\/MQKGitHub",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MQKGitHub\/Moniker-Link-CVE-2024-21413",
"description": null,
"fork": false,
"created_at": "2025-05-30T11:57:00Z",
"updated_at": "2025-05-30T11:58:33Z",
"pushed_at": "2025-05-30T11:58:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1062223539,
"name": "Email-exploit-Moniker-Link-CVE-2024-21413-",
"full_name": "yass2400012\/Email-exploit-Moniker-Link-CVE-2024-21413-",
"owner": {
"login": "yass2400012",
"id": 92322913,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92322913?v=4",
"html_url": "https:\/\/github.com\/yass2400012",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/yass2400012\/Email-exploit-Moniker-Link-CVE-2024-21413-",
"description": null,
"fork": false,
"created_at": "2025-09-23T01:28:42Z",
"updated_at": "2025-09-23T01:51:48Z",
"pushed_at": "2025-09-23T01:51:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1091168829,
"name": "CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability-PoC",
"full_name": "gurleen-147\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability-PoC",
"owner": {
"login": "gurleen-147",
"id": 241869242,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/241869242?v=4",
"html_url": "https:\/\/github.com\/gurleen-147",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/gurleen-147\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability-PoC",
"description": "This repository contains research notes and a high-level proof-of-concept (PoC) for CVE-2024-21413, a vulnerability observed in certain mail clients when handling SMB\/moniker-style links embedded in messages. The PoC and experiments documented here were performed in a controlled lab environment on systems.",
"fork": false,
"created_at": "2025-11-06T16:42:03Z",
"updated_at": "2025-11-22T18:53:48Z",
"pushed_at": "2025-11-22T18:53:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 1100261943,
"name": "Moniker-Link-CVE-2024-21413-",
"full_name": "hau2212\/Moniker-Link-CVE-2024-21413-",
"owner": {
"login": "hau2212",
"id": 81369957,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81369957?v=4",
"html_url": "https:\/\/github.com\/hau2212",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hau2212\/Moniker-Link-CVE-2024-21413-",
"description": null,
"fork": false,
"created_at": "2025-11-20T03:47:53Z",
"updated_at": "2025-11-20T06:11:59Z",
"pushed_at": "2025-11-20T06:11:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]