83 lines
No EOL
3.3 KiB
JSON
83 lines
No EOL
3.3 KiB
JSON
[
|
||
{
|
||
"name": "CVE-2024-7954",
|
||
"full_name": "Chocapikk/CVE-2024-7954",
|
||
"html_url": "https://github.com/Chocapikk/CVE-2024-7954",
|
||
"description": "Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12",
|
||
"stargazers_count": 10,
|
||
"forks_count": 4,
|
||
"created_at": "2024-08-10T20:15:41Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-7954-RCE",
|
||
"full_name": "gh-ost00/CVE-2024-7954-RCE",
|
||
"html_url": "https://github.com/gh-ost00/CVE-2024-7954-RCE",
|
||
"description": "Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12 ",
|
||
"stargazers_count": 6,
|
||
"forks_count": 2,
|
||
"created_at": "2024-09-01T10:59:45Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-7954",
|
||
"full_name": "bigb0x/CVE-2024-7954",
|
||
"html_url": "https://github.com/bigb0x/CVE-2024-7954",
|
||
"description": "This exploit will attempt to execute system commands on SPIP targets.",
|
||
"stargazers_count": 5,
|
||
"forks_count": 2,
|
||
"created_at": "2024-08-28T14:54:56Z"
|
||
},
|
||
{
|
||
"name": "RCE-CVE-2024-7954",
|
||
"full_name": "MuhammadWaseem29/RCE-CVE-2024-7954",
|
||
"html_url": "https://github.com/MuhammadWaseem29/RCE-CVE-2024-7954",
|
||
"description": null,
|
||
"stargazers_count": 5,
|
||
"forks_count": 1,
|
||
"created_at": "2024-10-05T07:24:57Z"
|
||
},
|
||
{
|
||
"name": "RCE_CVE-2024-7954",
|
||
"full_name": "TheCyberguy-17/RCE_CVE-2024-7954",
|
||
"html_url": "https://github.com/TheCyberguy-17/RCE_CVE-2024-7954",
|
||
"description": null,
|
||
"stargazers_count": 3,
|
||
"forks_count": 1,
|
||
"created_at": "2024-09-23T16:11:20Z"
|
||
},
|
||
{
|
||
"name": "RCE_CVE-2024-7954-",
|
||
"full_name": "0dayan0n/RCE_CVE-2024-7954-",
|
||
"html_url": "https://github.com/0dayan0n/RCE_CVE-2024-7954-",
|
||
"description": "The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request. (CRITICAL)",
|
||
"stargazers_count": 2,
|
||
"forks_count": 0,
|
||
"created_at": "2024-12-28T01:05:05Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-7954",
|
||
"full_name": "issamjr/CVE-2024-7954",
|
||
"html_url": "https://github.com/issamjr/CVE-2024-7954",
|
||
"description": "The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.",
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2024-11-15T21:08:47Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-7954POC",
|
||
"full_name": "zxj-hub/CVE-2024-7954POC",
|
||
"html_url": "https://github.com/zxj-hub/CVE-2024-7954POC",
|
||
"description": "SPIP 4.30-alpha2、4.2.13、4.1.16之前的版本使用的porte_plume插件存在任意代码执行漏洞,远程未经身份验证的攻击者可以通过发送精心设计的HTTP 请求以SPIP用户身份执行任意PHP代码。",
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2024-12-20T15:40:35Z"
|
||
},
|
||
{
|
||
"name": "RCE-CVE-2024-7954",
|
||
"full_name": "Arthikw3b/RCE-CVE-2024-7954",
|
||
"html_url": "https://github.com/Arthikw3b/RCE-CVE-2024-7954",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2025-02-05T16:13:39Z"
|
||
}
|
||
] |