PoC-in-GitHub/2024/CVE-2024-44000.json
2025-01-15 15:32:14 +09:00

126 lines
No EOL
4.5 KiB
JSON

[
{
"id": 853128126,
"name": "CVE-2024-44000-LiteSpeed-Cache",
"full_name": "absholi7ly\/CVE-2024-44000-LiteSpeed-Cache",
"owner": {
"login": "absholi7ly",
"id": 72062217,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72062217?v=4",
"html_url": "https:\/\/github.com\/absholi7ly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/absholi7ly\/CVE-2024-44000-LiteSpeed-Cache",
"description": "CVE-2024-44000 is a vulnerability in the LiteSpeed Cache plugin, a popular WordPress plugin. This vulnerability affects session management in LiteSpeed Cache, allowing attackers to gain unauthorized access to sensitive data.",
"fork": false,
"created_at": "2024-09-06T03:38:13Z",
"updated_at": "2024-12-30T11:41:54Z",
"pushed_at": "2024-09-06T03:54:52Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 10,
"score": 0,
"subscribers_count": 2
},
{
"id": 853354116,
"name": "CVE-2024-44000",
"full_name": "gbrsh\/CVE-2024-44000",
"owner": {
"login": "gbrsh",
"id": 36970331,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36970331?v=4",
"html_url": "https:\/\/github.com\/gbrsh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/gbrsh\/CVE-2024-44000",
"description": "LiteSpeed Unauthorized Account Takeover",
"fork": false,
"created_at": "2024-09-06T13:43:30Z",
"updated_at": "2024-09-06T13:46:53Z",
"pushed_at": "2024-09-06T13:46:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 858218268,
"name": "CVE-2024-44000-LiteSpeed-Cache",
"full_name": "ifqygazhar\/CVE-2024-44000-LiteSpeed-Cache",
"owner": {
"login": "ifqygazhar",
"id": 82558488,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82558488?v=4",
"html_url": "https:\/\/github.com\/ifqygazhar",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ifqygazhar\/CVE-2024-44000-LiteSpeed-Cache",
"description": "CVE-2024-44000-LiteSpeed-Cache",
"fork": false,
"created_at": "2024-09-16T14:13:52Z",
"updated_at": "2024-10-30T09:53:59Z",
"pushed_at": "2024-09-16T14:27:33Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 870756822,
"name": "CVE-2024-44000",
"full_name": "geniuszly\/CVE-2024-44000",
"owner": {
"login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2024-44000",
"description": "is a PoC tool designed to exploit insecurely exposed debug logs from WordPress sites and extract session cookies",
"fork": false,
"created_at": "2024-10-10T15:58:10Z",
"updated_at": "2024-10-21T08:14:54Z",
"pushed_at": "2024-10-10T15:59:51Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 2
}
]