[ { "name": "CVE-2024-7954", "full_name": "Chocapikk/CVE-2024-7954", "html_url": "https://github.com/Chocapikk/CVE-2024-7954", "description": "Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12", "stargazers_count": 10, "forks_count": 4, "created_at": "2024-08-10T20:15:41Z" }, { "name": "CVE-2024-7954-RCE", "full_name": "gh-ost00/CVE-2024-7954-RCE", "html_url": "https://github.com/gh-ost00/CVE-2024-7954-RCE", "description": "Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12 ", "stargazers_count": 6, "forks_count": 2, "created_at": "2024-09-01T10:59:45Z" }, { "name": "CVE-2024-7954", "full_name": "bigb0x/CVE-2024-7954", "html_url": "https://github.com/bigb0x/CVE-2024-7954", "description": "This exploit will attempt to execute system commands on SPIP targets.", "stargazers_count": 5, "forks_count": 2, "created_at": "2024-08-28T14:54:56Z" }, { "name": "RCE-CVE-2024-7954", "full_name": "MuhammadWaseem29/RCE-CVE-2024-7954", "html_url": "https://github.com/MuhammadWaseem29/RCE-CVE-2024-7954", "description": null, "stargazers_count": 5, "forks_count": 1, "created_at": "2024-10-05T07:24:57Z" }, { "name": "RCE_CVE-2024-7954", "full_name": "TheCyberguy-17/RCE_CVE-2024-7954", "html_url": "https://github.com/TheCyberguy-17/RCE_CVE-2024-7954", "description": null, "stargazers_count": 3, "forks_count": 1, "created_at": "2024-09-23T16:11:20Z" }, { "name": "RCE_CVE-2024-7954-", "full_name": "0dayan0n/RCE_CVE-2024-7954-", "html_url": "https://github.com/0dayan0n/RCE_CVE-2024-7954-", "description": "The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request. (CRITICAL)", "stargazers_count": 2, "forks_count": 0, "created_at": "2024-12-28T01:05:05Z" }, { "name": "CVE-2024-7954", "full_name": "issamjr/CVE-2024-7954", "html_url": "https://github.com/issamjr/CVE-2024-7954", "description": "The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.", "stargazers_count": 1, "forks_count": 0, "created_at": "2024-11-15T21:08:47Z" }, { "name": "CVE-2024-7954POC", "full_name": "zxj-hub/CVE-2024-7954POC", "html_url": "https://github.com/zxj-hub/CVE-2024-7954POC", "description": "SPIP 4.30-alpha2、4.2.13、4.1.16之前的版本使用的porte_plume插件存在任意代码执行漏洞,远程未经身份验证的攻击者可以通过发送精心设计的HTTP 请求以SPIP用户身份执行任意PHP代码。", "stargazers_count": 0, "forks_count": 0, "created_at": "2024-12-20T15:40:35Z" }, { "name": "RCE-CVE-2024-7954", "full_name": "Arthikw3b/RCE-CVE-2024-7954", "html_url": "https://github.com/Arthikw3b/RCE-CVE-2024-7954", "description": null, "stargazers_count": 0, "forks_count": 0, "created_at": "2025-02-05T16:13:39Z" } ]