mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2026-03-14 20:28:35 +01:00
188 lines
No EOL
6.5 KiB
JSON
188 lines
No EOL
6.5 KiB
JSON
[
|
|
{
|
|
"id": 1146986767,
|
|
"name": "CVE-2024-46987",
|
|
"full_name": "Goultarde\/CVE-2024-46987",
|
|
"owner": {
|
|
"login": "Goultarde",
|
|
"id": 117078126,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117078126?v=4",
|
|
"html_url": "https:\/\/github.com\/Goultarde",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Goultarde\/CVE-2024-46987",
|
|
"description": "This Python PoC exploits CVE-2024-46987, a Path Traversal bug in Camaleon CMS 2.8.0 < 2.8.2 (work on 2.9.0). It allows authenticated users to read sensitive server files via the MediaController. Intended for authorized security auditing and educational research only. ",
|
|
"fork": false,
|
|
"created_at": "2026-02-01T02:06:33Z",
|
|
"updated_at": "2026-02-05T10:09:49Z",
|
|
"pushed_at": "2026-02-01T02:06:47Z",
|
|
"stargazers_count": 9,
|
|
"watchers_count": 9,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 9,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1148935087,
|
|
"name": "CVE-2024-46987",
|
|
"full_name": "L1337Xi\/CVE-2024-46987",
|
|
"owner": {
|
|
"login": "L1337Xi",
|
|
"id": 104053455,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104053455?v=4",
|
|
"html_url": "https:\/\/github.com\/L1337Xi",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/L1337Xi\/CVE-2024-46987",
|
|
"description": "Path Traversal vulnerability",
|
|
"fork": false,
|
|
"created_at": "2026-02-03T14:37:59Z",
|
|
"updated_at": "2026-02-03T15:26:16Z",
|
|
"pushed_at": "2026-02-03T14:54:47Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1149503700,
|
|
"name": "CVE-2024-46987",
|
|
"full_name": "Ik0nw\/CVE-2024-46987",
|
|
"owner": {
|
|
"login": "Ik0nw",
|
|
"id": 48197340,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48197340?v=4",
|
|
"html_url": "https:\/\/github.com\/Ik0nw",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Ik0nw\/CVE-2024-46987",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2026-02-04T07:27:39Z",
|
|
"updated_at": "2026-02-04T07:27:47Z",
|
|
"pushed_at": "2026-02-04T07:27:43Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1150404791,
|
|
"name": "Exploit-for-CVE-2024-46987",
|
|
"full_name": "sparrowhawk1113\/Exploit-for-CVE-2024-46987",
|
|
"owner": {
|
|
"login": "sparrowhawk1113",
|
|
"id": 135139561,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135139561?v=4",
|
|
"html_url": "https:\/\/github.com\/sparrowhawk1113",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/sparrowhawk1113\/Exploit-for-CVE-2024-46987",
|
|
"description": "Exploit for CVE-2024-46987",
|
|
"fork": false,
|
|
"created_at": "2026-02-05T08:36:37Z",
|
|
"updated_at": "2026-02-05T18:17:15Z",
|
|
"pushed_at": "2026-02-05T18:17:12Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1150496331,
|
|
"name": "CVE-2024-46987",
|
|
"full_name": "Rival420\/CVE-2024-46987",
|
|
"owner": {
|
|
"login": "Rival420",
|
|
"id": 51548322,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51548322?v=4",
|
|
"html_url": "https:\/\/github.com\/Rival420",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Rival420\/CVE-2024-46987",
|
|
"description": "CVE-2024-46987 - Camaleon CMS LFI Exploit",
|
|
"fork": false,
|
|
"created_at": "2026-02-05T10:51:30Z",
|
|
"updated_at": "2026-02-05T11:53:47Z",
|
|
"pushed_at": "2026-02-05T11:53:44Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1150938806,
|
|
"name": "CVE-2024-46987",
|
|
"full_name": "advaitpathak21\/CVE-2024-46987",
|
|
"owner": {
|
|
"login": "advaitpathak21",
|
|
"id": 55303152,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55303152?v=4",
|
|
"html_url": "https:\/\/github.com\/advaitpathak21",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/advaitpathak21\/CVE-2024-46987",
|
|
"description": "Exploit created using Python",
|
|
"fork": false,
|
|
"created_at": "2026-02-05T21:37:57Z",
|
|
"updated_at": "2026-02-06T04:09:40Z",
|
|
"pushed_at": "2026-02-06T04:09:37Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
}
|
|
] |