PoC-in-GitHub/2024/CVE-2024-46987.json
2026-02-04 03:47:48 +09:00

64 lines
No EOL
2.3 KiB
JSON

[
{
"id": 1146986767,
"name": "CVE-2024-46987",
"full_name": "Goultarde\/CVE-2024-46987",
"owner": {
"login": "Goultarde",
"id": 117078126,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117078126?v=4",
"html_url": "https:\/\/github.com\/Goultarde",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Goultarde\/CVE-2024-46987",
"description": "This Python PoC exploits CVE-2024-46987, a Path Traversal bug in Camaleon CMS 2.8.0 < 2.8.2 (work on 2.9.0). It allows authenticated users to read sensitive server files via the MediaController. Intended for authorized security auditing and educational research only. ",
"fork": false,
"created_at": "2026-02-01T02:06:33Z",
"updated_at": "2026-02-03T17:37:25Z",
"pushed_at": "2026-02-01T02:06:47Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 0
},
{
"id": 1148935087,
"name": "CVE-2024-46987",
"full_name": "L1337Xi\/CVE-2024-46987",
"owner": {
"login": "L1337Xi",
"id": 104053455,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104053455?v=4",
"html_url": "https:\/\/github.com\/L1337Xi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/L1337Xi\/CVE-2024-46987",
"description": "Path Traversal vulnerability",
"fork": false,
"created_at": "2026-02-03T14:37:59Z",
"updated_at": "2026-02-03T15:26:16Z",
"pushed_at": "2026-02-03T14:54:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]