PoC-in-GitHub/2024/CVE-2024-4879.json
2025-10-22 15:41:05 +09:00

250 lines
No EOL
9 KiB
JSON

[
{
"id": 827768710,
"name": "CVE-2024-4879",
"full_name": "Brut-Security\/CVE-2024-4879",
"owner": {
"login": "Brut-Security",
"id": 172168319,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168319?v=4",
"html_url": "https:\/\/github.com\/Brut-Security",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Brut-Security\/CVE-2024-4879",
"description": "CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow",
"fork": false,
"created_at": "2024-07-12T10:32:37Z",
"updated_at": "2025-07-23T08:49:46Z",
"pushed_at": "2024-07-13T10:46:32Z",
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 25,
"score": 0,
"subscribers_count": 3
},
{
"id": 827823810,
"name": "CVE-2024-4879",
"full_name": "bigb0x\/CVE-2024-4879",
"owner": {
"login": "bigb0x",
"id": 13532434,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4",
"html_url": "https:\/\/github.com\/bigb0x",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-4879",
"description": "Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerability",
"fork": false,
"created_at": "2024-07-12T13:02:47Z",
"updated_at": "2025-09-18T04:00:17Z",
"pushed_at": "2024-07-12T20:48:26Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
{
"id": 828006472,
"name": "CVE-2024-4879",
"full_name": "Mr-r00t11\/CVE-2024-4879",
"owner": {
"login": "Mr-r00t11",
"id": 68824333,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68824333?v=4",
"html_url": "https:\/\/github.com\/Mr-r00t11",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Mr-r00t11\/CVE-2024-4879",
"description": "CVE-2024-4879.py is a Python script designed to detect specific vulnerabilities in ServiceNow instances and dump database connection details if the vulnerability is found. This tool is particularly useful for security researchers and penetration testers.",
"fork": false,
"created_at": "2024-07-12T21:43:48Z",
"updated_at": "2025-10-22T02:43:42Z",
"pushed_at": "2024-07-12T21:46:19Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 829246851,
"name": "CVE-2024-4879-ServiceNow",
"full_name": "Praison001\/CVE-2024-4879-ServiceNow",
"owner": {
"login": "Praison001",
"id": 60835238,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
"html_url": "https:\/\/github.com\/Praison001",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Praison001\/CVE-2024-4879-ServiceNow",
"description": "Exploit for CVE-2024-4879 affecting Vancouver, Washington DC Now and Utah Platform releases",
"fork": false,
"created_at": "2024-07-16T04:03:28Z",
"updated_at": "2025-03-16T15:42:05Z",
"pushed_at": "2024-07-16T04:26:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 834723031,
"name": "CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning",
"full_name": "NoTsPepino\/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning",
"owner": {
"login": "NoTsPepino",
"id": 107086092,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107086092?v=4",
"html_url": "https:\/\/github.com\/NoTsPepino",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/NoTsPepino\/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning",
"description": "CVE-2024-4879 & CVE-2024-5217 ServiceNow RCE Scanning Using Nuclei & Shodan Dork to find it.",
"fork": false,
"created_at": "2024-07-28T06:51:33Z",
"updated_at": "2025-08-29T16:34:19Z",
"pushed_at": "2024-08-03T03:09:56Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 842345831,
"name": "CVE-2024-4879",
"full_name": "jdusane\/CVE-2024-4879",
"owner": {
"login": "jdusane",
"id": 16679951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16679951?v=4",
"html_url": "https:\/\/github.com\/jdusane",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jdusane\/CVE-2024-4879",
"description": "Python script designed to detect specific vulnerabilities in ServiceNow instances and dump database connection details if the vulnerability is found. This tool is particularly useful for security researchers and penetration testers.",
"fork": false,
"created_at": "2024-08-14T06:55:41Z",
"updated_at": "2024-08-14T07:00:05Z",
"pushed_at": "2024-08-14T07:00:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 848057101,
"name": "CVE-2024-4879",
"full_name": "gh-ost00\/CVE-2024-4879",
"owner": {
"login": "gh-ost00",
"id": 153366162,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4",
"html_url": "https:\/\/github.com\/gh-ost00",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/gh-ost00\/CVE-2024-4879",
"description": "Jelly Template Injection Vulnerability in ServiceNow | POC CVE-2024-4879",
"fork": false,
"created_at": "2024-08-27T03:43:28Z",
"updated_at": "2024-09-12T02:37:10Z",
"pushed_at": "2024-08-27T03:56:52Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 856665318,
"name": "CVE-2024-4879",
"full_name": "0xWhoami35\/CVE-2024-4879",
"owner": {
"login": "0xWhoami35",
"id": 107396843,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107396843?v=4",
"html_url": "https:\/\/github.com\/0xWhoami35",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xWhoami35\/CVE-2024-4879",
"description": null,
"fork": false,
"created_at": "2024-09-13T01:20:34Z",
"updated_at": "2024-09-13T01:33:09Z",
"pushed_at": "2024-09-13T01:33:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]