272 lines
No EOL
9.2 KiB
JSON
272 lines
No EOL
9.2 KiB
JSON
[
|
||
{
|
||
"name": "CVE-2024-4577",
|
||
"full_name": "watchtowrlabs/CVE-2024-4577",
|
||
"html_url": "https://github.com/watchtowrlabs/CVE-2024-4577",
|
||
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
|
||
"stargazers_count": 285,
|
||
"forks_count": 61,
|
||
"created_at": "2024-06-07T09:52:54Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577-PHP-RCE",
|
||
"full_name": "xcanwin/CVE-2024-4577-PHP-RCE",
|
||
"html_url": "https://github.com/xcanwin/CVE-2024-4577-PHP-RCE",
|
||
"description": "[漏洞复现] 全球首款利用PHP默认环境(XAMPP)的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP。",
|
||
"stargazers_count": 148,
|
||
"forks_count": 34,
|
||
"created_at": "2024-06-08T13:04:45Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577",
|
||
"full_name": "TAM-K592/CVE-2024-4577",
|
||
"html_url": "https://github.com/TAM-K592/CVE-2024-4577",
|
||
"description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.",
|
||
"stargazers_count": 78,
|
||
"forks_count": 18,
|
||
"created_at": "2024-06-07T05:50:23Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577",
|
||
"full_name": "11whoami99/CVE-2024-4577",
|
||
"html_url": "https://github.com/11whoami99/CVE-2024-4577",
|
||
"description": "POC & $BASH script for CVE-2024-4577",
|
||
"stargazers_count": 44,
|
||
"forks_count": 10,
|
||
"created_at": "2024-06-07T09:51:39Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577-PHP-RCE",
|
||
"full_name": "shockingbonu/CVE-2024-4577-PHP-RCE",
|
||
"html_url": "https://github.com/shockingbonu/CVE-2024-4577-PHP-RCE",
|
||
"description": "PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template cve-2024-4577, pentest, php, poc, rce-exploit, redteam",
|
||
"stargazers_count": 37,
|
||
"forks_count": 0,
|
||
"created_at": "2025-05-19T20:34:28Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577",
|
||
"full_name": "Chocapikk/CVE-2024-4577",
|
||
"html_url": "https://github.com/Chocapikk/CVE-2024-4577",
|
||
"description": "PHP CGI Argument Injection vulnerability",
|
||
"stargazers_count": 29,
|
||
"forks_count": 13,
|
||
"created_at": "2024-06-09T14:18:21Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577-PHP-RCE",
|
||
"full_name": "ZephrFish/CVE-2024-4577-PHP-RCE",
|
||
"html_url": "https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE",
|
||
"description": "PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template",
|
||
"stargazers_count": 26,
|
||
"forks_count": 12,
|
||
"created_at": "2024-06-08T12:23:35Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577-RCE-PoC",
|
||
"full_name": "BTtea/CVE-2024-4577-RCE-PoC",
|
||
"html_url": "https://github.com/BTtea/CVE-2024-4577-RCE-PoC",
|
||
"description": "CVE-2024-4577 RCE PoC",
|
||
"stargazers_count": 24,
|
||
"forks_count": 2,
|
||
"created_at": "2024-11-06T05:30:33Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577-RCE",
|
||
"full_name": "gh-ost00/CVE-2024-4577-RCE",
|
||
"html_url": "https://github.com/gh-ost00/CVE-2024-4577-RCE",
|
||
"description": "PHP CGI Argument Injection (CVE-2024-4577) RCE",
|
||
"stargazers_count": 20,
|
||
"forks_count": 4,
|
||
"created_at": "2024-08-20T02:56:03Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577-Nuclei-Template",
|
||
"full_name": "huseyinstif/CVE-2024-4577-Nuclei-Template",
|
||
"html_url": "https://github.com/huseyinstif/CVE-2024-4577-Nuclei-Template",
|
||
"description": null,
|
||
"stargazers_count": 19,
|
||
"forks_count": 2,
|
||
"created_at": "2024-06-07T10:40:37Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577",
|
||
"full_name": "gotr00t0day/CVE-2024-4577",
|
||
"html_url": "https://github.com/gotr00t0day/CVE-2024-4577",
|
||
"description": "Argument injection vulnerability in PHP",
|
||
"stargazers_count": 11,
|
||
"forks_count": 3,
|
||
"created_at": "2024-06-15T02:49:37Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577-EXPLOIT",
|
||
"full_name": "K3ysTr0K3R/CVE-2024-4577-EXPLOIT",
|
||
"html_url": "https://github.com/K3ysTr0K3R/CVE-2024-4577-EXPLOIT",
|
||
"description": "A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)",
|
||
"stargazers_count": 9,
|
||
"forks_count": 2,
|
||
"created_at": "2024-06-09T23:32:11Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577",
|
||
"full_name": "manuelinfosec/CVE-2024-4577",
|
||
"html_url": "https://github.com/manuelinfosec/CVE-2024-4577",
|
||
"description": "Proof Of Concept RCE exploit for critical vulnerability in PHP <8.2.15 (Windows), allowing attackers to execute arbitrary commands.",
|
||
"stargazers_count": 9,
|
||
"forks_count": 0,
|
||
"created_at": "2024-06-08T05:27:44Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577-RCE",
|
||
"full_name": "l0n3m4n/CVE-2024-4577-RCE",
|
||
"html_url": "https://github.com/l0n3m4n/CVE-2024-4577-RCE",
|
||
"description": "PoC - PHP CGI Argument Injection CVE-2024-4577 (Scanner and Exploit)",
|
||
"stargazers_count": 7,
|
||
"forks_count": 2,
|
||
"created_at": "2024-07-06T19:37:14Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577",
|
||
"full_name": "longhoangth18/CVE-2024-4577",
|
||
"html_url": "https://github.com/longhoangth18/CVE-2024-4577",
|
||
"description": null,
|
||
"stargazers_count": 5,
|
||
"forks_count": 1,
|
||
"created_at": "2024-10-14T09:11:06Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577",
|
||
"full_name": "Sh0ckFR/CVE-2024-4577",
|
||
"html_url": "https://github.com/Sh0ckFR/CVE-2024-4577",
|
||
"description": "Fixed and minimalist PoC of the CVE-2024-4577",
|
||
"stargazers_count": 4,
|
||
"forks_count": 0,
|
||
"created_at": "2024-06-13T14:25:04Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577-RCE-ATTACK",
|
||
"full_name": "bibo318/CVE-2024-4577-RCE-ATTACK",
|
||
"html_url": "https://github.com/bibo318/CVE-2024-4577-RCE-ATTACK",
|
||
"description": "ATTACK PoC - PHP CVE-2024-4577 ",
|
||
"stargazers_count": 4,
|
||
"forks_count": 0,
|
||
"created_at": "2024-07-11T02:22:32Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577",
|
||
"full_name": "zomasec/CVE-2024-4577",
|
||
"html_url": "https://github.com/zomasec/CVE-2024-4577",
|
||
"description": "CVE-2024-4577 Exploit POC ",
|
||
"stargazers_count": 3,
|
||
"forks_count": 0,
|
||
"created_at": "2024-06-08T06:36:14Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577-checker",
|
||
"full_name": "JeninSutradhar/CVE-2024-4577-checker",
|
||
"html_url": "https://github.com/JeninSutradhar/CVE-2024-4577-checker",
|
||
"description": "A Bash script designed to scan multiple domains for the CVE-2024-4577 vulnerability in PHP-CGI.",
|
||
"stargazers_count": 3,
|
||
"forks_count": 1,
|
||
"created_at": "2024-10-04T13:10:19Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577-nuclei",
|
||
"full_name": "0x20c/CVE-2024-4577-nuclei",
|
||
"html_url": "https://github.com/0x20c/CVE-2024-4577-nuclei",
|
||
"description": "CVE-2024-4577 nuclei-templates",
|
||
"stargazers_count": 3,
|
||
"forks_count": 0,
|
||
"created_at": "2024-06-08T03:12:28Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577",
|
||
"full_name": "Junp0/CVE-2024-4577",
|
||
"html_url": "https://github.com/Junp0/CVE-2024-4577",
|
||
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
|
||
"stargazers_count": 2,
|
||
"forks_count": 3,
|
||
"created_at": "2024-06-07T09:42:40Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577",
|
||
"full_name": "AlperenY-cs/CVE-2024-4577",
|
||
"html_url": "https://github.com/AlperenY-cs/CVE-2024-4577",
|
||
"description": "Create lab for CVE-2024-4577",
|
||
"stargazers_count": 2,
|
||
"forks_count": 0,
|
||
"created_at": "2024-06-28T14:11:15Z"
|
||
},
|
||
{
|
||
"name": "cve-2024-4577",
|
||
"full_name": "aaddmin1122345/cve-2024-4577",
|
||
"html_url": "https://github.com/aaddmin1122345/cve-2024-4577",
|
||
"description": "CVE-2024-4577",
|
||
"stargazers_count": 2,
|
||
"forks_count": 0,
|
||
"created_at": "2024-06-12T04:50:25Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577",
|
||
"full_name": "VictorShem/CVE-2024-4577",
|
||
"html_url": "https://github.com/VictorShem/CVE-2024-4577",
|
||
"description": "CVE-2024-4577 POC",
|
||
"stargazers_count": 2,
|
||
"forks_count": 1,
|
||
"created_at": "2024-06-17T17:53:31Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577",
|
||
"full_name": "phirojshah/CVE-2024-4577",
|
||
"html_url": "https://github.com/phirojshah/CVE-2024-4577",
|
||
"description": null,
|
||
"stargazers_count": 2,
|
||
"forks_count": 1,
|
||
"created_at": "2024-09-12T19:27:52Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577",
|
||
"full_name": "Wh02m1/CVE-2024-4577",
|
||
"html_url": "https://github.com/Wh02m1/CVE-2024-4577",
|
||
"description": null,
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2024-06-07T12:49:20Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577",
|
||
"full_name": "taida957789/CVE-2024-4577",
|
||
"html_url": "https://github.com/taida957789/CVE-2024-4577",
|
||
"description": null,
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2024-06-07T10:58:57Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577",
|
||
"full_name": "sug4r-wr41th/CVE-2024-4577",
|
||
"html_url": "https://github.com/sug4r-wr41th/CVE-2024-4577",
|
||
"description": "PHP CGI CVE-2024-4577 PoC",
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2025-04-12T12:28:11Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577",
|
||
"full_name": "ggfzx/CVE-2024-4577",
|
||
"html_url": "https://github.com/ggfzx/CVE-2024-4577",
|
||
"description": null,
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2024-06-26T07:07:49Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-4577",
|
||
"full_name": "nemu1k5ma/CVE-2024-4577",
|
||
"html_url": "https://github.com/nemu1k5ma/CVE-2024-4577",
|
||
"description": "php-cgi RCE快速检测",
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2024-06-12T02:16:09Z"
|
||
}
|
||
] |