Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | jsonpath-plus | 0 ~ * | - | |
| - | org.webjars.npm:jsonpath-plus | 0 ~ * | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Proof-of-concept (PoC) exploit for JSONPath-plus vulnerability | https://github.com/pabloopez/CVE-2024-21534 | POC Details |
| 2 | None | https://github.com/XiaomingX/CVE-2024-21534-poc | POC Details |
| 3 | jsonpath-plus 包(版本 <=10.0.7)存在严重的远程代码执行(RCE)漏洞,允许攻击者通过 Node.js 的 VM 模块执行任意代码。该漏洞由于输入验证不严格导致,影响版本为 10.0.7 以下,CVSS 分数为 9.8(极其严重)。漏洞首次公开于 2024 年 10 月 11 日。 | https://github.com/XiaomingX/cve-2024-21534-poc | POC Details |
| 4 | POC - CVE-2024-21534 Jsonpath-plus vulnerable to Remote Code Execution (RCE) due to improper input sanitization | https://github.com/verylazytech/cve-2024-21534 | POC Details |
| 5 | None | https://github.com/BohemianHacks/CVE-2024-21534-poc | POC Details |
No public POC found.
Login to generate AI POCNo comments yet