PoC-in-GitHub/2026/CVE-2026-23744.json
2026-01-26 15:45:33 +09:00

33 lines
No EOL
1.4 KiB
JSON

[
{
"id": 1138037990,
"name": "CVE-2026-23744-PoC",
"full_name": "boroeurnprach\/CVE-2026-23744-PoC",
"owner": {
"login": "boroeurnprach",
"id": 144204725,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144204725?v=4",
"html_url": "https:\/\/github.com\/boroeurnprach",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/boroeurnprach\/CVE-2026-23744-PoC",
"description": "CVE-2026-23744 - Versions 1.4.2 and earlier of MCPJam inspector are vulnerable to remote code execution (RCE). Because the tool listens on 0.0.0.0 by default, an attacker can trigger the installation and execution of a malicious MCP server by sending a crafted HTTP request. Version 1.4.3 contains a patch for this issue.",
"fork": false,
"created_at": "2026-01-20T06:55:53Z",
"updated_at": "2026-01-26T04:22:45Z",
"pushed_at": "2026-01-23T05:00:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]