PoC-in-GitHub/2024/CVE-2024-46987.json
2026-02-06 15:46:09 +09:00

188 lines
No EOL
6.5 KiB
JSON

[
{
"id": 1146986767,
"name": "CVE-2024-46987",
"full_name": "Goultarde\/CVE-2024-46987",
"owner": {
"login": "Goultarde",
"id": 117078126,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117078126?v=4",
"html_url": "https:\/\/github.com\/Goultarde",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Goultarde\/CVE-2024-46987",
"description": "This Python PoC exploits CVE-2024-46987, a Path Traversal bug in Camaleon CMS 2.8.0 < 2.8.2 (work on 2.9.0). It allows authenticated users to read sensitive server files via the MediaController. Intended for authorized security auditing and educational research only. ",
"fork": false,
"created_at": "2026-02-01T02:06:33Z",
"updated_at": "2026-02-05T10:09:49Z",
"pushed_at": "2026-02-01T02:06:47Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"score": 0,
"subscribers_count": 0
},
{
"id": 1148935087,
"name": "CVE-2024-46987",
"full_name": "L1337Xi\/CVE-2024-46987",
"owner": {
"login": "L1337Xi",
"id": 104053455,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104053455?v=4",
"html_url": "https:\/\/github.com\/L1337Xi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/L1337Xi\/CVE-2024-46987",
"description": "Path Traversal vulnerability",
"fork": false,
"created_at": "2026-02-03T14:37:59Z",
"updated_at": "2026-02-03T15:26:16Z",
"pushed_at": "2026-02-03T14:54:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1149503700,
"name": "CVE-2024-46987",
"full_name": "Ik0nw\/CVE-2024-46987",
"owner": {
"login": "Ik0nw",
"id": 48197340,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48197340?v=4",
"html_url": "https:\/\/github.com\/Ik0nw",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Ik0nw\/CVE-2024-46987",
"description": null,
"fork": false,
"created_at": "2026-02-04T07:27:39Z",
"updated_at": "2026-02-04T07:27:47Z",
"pushed_at": "2026-02-04T07:27:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1150404791,
"name": "Exploit-for-CVE-2024-46987",
"full_name": "sparrowhawk1113\/Exploit-for-CVE-2024-46987",
"owner": {
"login": "sparrowhawk1113",
"id": 135139561,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135139561?v=4",
"html_url": "https:\/\/github.com\/sparrowhawk1113",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sparrowhawk1113\/Exploit-for-CVE-2024-46987",
"description": "Exploit for CVE-2024-46987",
"fork": false,
"created_at": "2026-02-05T08:36:37Z",
"updated_at": "2026-02-05T18:17:15Z",
"pushed_at": "2026-02-05T18:17:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1150496331,
"name": "CVE-2024-46987",
"full_name": "Rival420\/CVE-2024-46987",
"owner": {
"login": "Rival420",
"id": 51548322,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51548322?v=4",
"html_url": "https:\/\/github.com\/Rival420",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Rival420\/CVE-2024-46987",
"description": "CVE-2024-46987 - Camaleon CMS LFI Exploit",
"fork": false,
"created_at": "2026-02-05T10:51:30Z",
"updated_at": "2026-02-05T11:53:47Z",
"pushed_at": "2026-02-05T11:53:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1150938806,
"name": "CVE-2024-46987",
"full_name": "advaitpathak21\/CVE-2024-46987",
"owner": {
"login": "advaitpathak21",
"id": 55303152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55303152?v=4",
"html_url": "https:\/\/github.com\/advaitpathak21",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/advaitpathak21\/CVE-2024-46987",
"description": "Exploit created using Python",
"fork": false,
"created_at": "2026-02-05T21:37:57Z",
"updated_at": "2026-02-06T04:09:40Z",
"pushed_at": "2026-02-06T04:09:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]