92 lines
No EOL
3.6 KiB
JSON
92 lines
No EOL
3.6 KiB
JSON
[
|
||
{
|
||
"name": "CVE-2024-4367-PoC",
|
||
"full_name": "LOURC0D3/CVE-2024-4367-PoC",
|
||
"html_url": "https://github.com/LOURC0D3/CVE-2024-4367-PoC",
|
||
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
|
||
"stargazers_count": 154,
|
||
"forks_count": 23,
|
||
"created_at": "2024-05-20T10:02:23Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4367-POC",
|
||
"full_name": "s4vvysec/CVE-2024-4367-POC",
|
||
"html_url": "https://github.com/s4vvysec/CVE-2024-4367-POC",
|
||
"description": "CVE-2024-4367 arbitrary js execution in pdf js",
|
||
"stargazers_count": 48,
|
||
"forks_count": 8,
|
||
"created_at": "2024-05-20T22:56:10Z"
|
||
},
|
||
{
|
||
"name": "detect-cve-2024-4367",
|
||
"full_name": "spaceraccoon/detect-cve-2024-4367",
|
||
"html_url": "https://github.com/spaceraccoon/detect-cve-2024-4367",
|
||
"description": "YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js",
|
||
"stargazers_count": 10,
|
||
"forks_count": 2,
|
||
"created_at": "2024-05-22T18:05:47Z"
|
||
},
|
||
{
|
||
"name": "cve-2024-4367-PoC-fixed",
|
||
"full_name": "Zombie-Kaiser/cve-2024-4367-PoC-fixed",
|
||
"html_url": "https://github.com/Zombie-Kaiser/cve-2024-4367-PoC-fixed",
|
||
"description": "PDF.js是由Mozilla维护的基于JavaScript的PDF查看器。此漏洞允许攻击者在打开恶意 PDF 文件后立即执行任意 JavaScript 代码。这会影响所有 Firefox 用户 (<126),因为 Firefox 使用 PDF.js 来显示 PDF 文件,但也严重影响了许多基于 Web 和 Electron 的应用程序,这些应用程序(间接)使用 PDF.js 进行预览功能。",
|
||
"stargazers_count": 10,
|
||
"forks_count": 1,
|
||
"created_at": "2024-06-13T15:14:47Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4367-Analysis",
|
||
"full_name": "Masamuneee/CVE-2024-4367-Analysis",
|
||
"html_url": "https://github.com/Masamuneee/CVE-2024-4367-Analysis",
|
||
"description": null,
|
||
"stargazers_count": 2,
|
||
"forks_count": 0,
|
||
"created_at": "2024-09-04T14:43:33Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4367-PoC",
|
||
"full_name": "inpentest/CVE-2024-4367-PoC",
|
||
"html_url": "https://github.com/inpentest/CVE-2024-4367-PoC",
|
||
"description": "This Proof of Concept (PoC) demonstrates the exploitation of the CVE-2024-4367 vulnerability, which involves Cross-Site Scripting (XSS) attacks.",
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2025-02-17T16:40:21Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4367-npm",
|
||
"full_name": "Scivous/CVE-2024-4367-npm",
|
||
"html_url": "https://github.com/Scivous/CVE-2024-4367-npm",
|
||
"description": "CVE-2024-4367复现",
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2024-06-21T08:16:42Z"
|
||
},
|
||
{
|
||
"name": "WEAPONIZING-CVE-2024-4367",
|
||
"full_name": "exfil0/WEAPONIZING-CVE-2024-4367",
|
||
"html_url": "https://github.com/exfil0/WEAPONIZING-CVE-2024-4367",
|
||
"description": "CVE-2024-4367 is a critical vulnerability (CVSS 9.8) in PDF.js, allowing arbitrary JavaScript code execution due to insufficient type checks on the FontMatrix object within PDF files.",
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2025-01-05T14:44:01Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4367-POC-PDFJS",
|
||
"full_name": "elamani-drawing/CVE-2024-4367-POC-PDFJS",
|
||
"html_url": "https://github.com/elamani-drawing/CVE-2024-4367-POC-PDFJS",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2025-03-25T16:27:24Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4367-pdf-sample",
|
||
"full_name": "pedrochalegre7/CVE-2024-4367-pdf-sample",
|
||
"html_url": "https://github.com/pedrochalegre7/CVE-2024-4367-pdf-sample",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2024-11-06T19:15:38Z"
|
||
}
|
||
] |