PoC-in-GitHub/2024/CVE-2024-4577.json
2024-06-10 15:30:27 +09:00

647 lines
No EOL
22 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 811695573,
"name": "CVE-2024-4577",
"full_name": "TAM-K592\/CVE-2024-4577",
"owner": {
"login": "TAM-K592",
"id": 8276702,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8276702?v=4",
"html_url": "https:\/\/github.com\/TAM-K592"
},
"html_url": "https:\/\/github.com\/TAM-K592\/CVE-2024-4577",
"description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.",
"fork": false,
"created_at": "2024-06-07T05:50:23Z",
"updated_at": "2024-06-09T13:14:46Z",
"pushed_at": "2024-06-07T11:49:08Z",
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 58,
"score": 0,
"subscribers_count": 4
},
{
"id": 811783487,
"name": "CVE-2024-4577",
"full_name": "ohhhh693\/CVE-2024-4577",
"owner": {
"login": "ohhhh693",
"id": 41501723,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41501723?v=4",
"html_url": "https:\/\/github.com\/ohhhh693"
},
"html_url": "https:\/\/github.com\/ohhhh693\/CVE-2024-4577",
"description": "CVE-2024-4577",
"fork": false,
"created_at": "2024-06-07T09:42:31Z",
"updated_at": "2024-06-07T10:30:02Z",
"pushed_at": "2024-06-07T10:29:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 811783553,
"name": "CVE-2024-4577",
"full_name": "Junp0\/CVE-2024-4577",
"owner": {
"login": "Junp0",
"id": 69783084,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69783084?v=4",
"html_url": "https:\/\/github.com\/Junp0"
},
"html_url": "https:\/\/github.com\/Junp0\/CVE-2024-4577",
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:42:40Z",
"updated_at": "2024-06-07T09:42:40Z",
"pushed_at": "2024-06-07T09:40:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 811785816,
"name": "CVE-2024-4577",
"full_name": "princew88\/CVE-2024-4577",
"owner": {
"login": "princew88",
"id": 165123229,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165123229?v=4",
"html_url": "https:\/\/github.com\/princew88"
},
"html_url": "https:\/\/github.com\/princew88\/CVE-2024-4577",
"description": null,
"fork": false,
"created_at": "2024-06-07T09:48:36Z",
"updated_at": "2024-06-07T09:48:40Z",
"pushed_at": "2024-06-07T09:48:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 811786940,
"name": "CVE-2024-4577",
"full_name": "11whoami99\/CVE-2024-4577",
"owner": {
"login": "11whoami99",
"id": 122907550,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122907550?v=4",
"html_url": "https:\/\/github.com\/11whoami99"
},
"html_url": "https:\/\/github.com\/11whoami99\/CVE-2024-4577",
"description": "POC & $BASH script for CVE-2024-4577",
"fork": false,
"created_at": "2024-06-07T09:51:39Z",
"updated_at": "2024-06-10T05:26:36Z",
"pushed_at": "2024-06-09T16:16:30Z",
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 26,
"score": 0,
"subscribers_count": 1
},
{
"id": 811787428,
"name": "CVE-2024-4577",
"full_name": "watchtowrlabs\/CVE-2024-4577",
"owner": {
"login": "watchtowrlabs",
"id": 99977116,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99977116?v=4",
"html_url": "https:\/\/github.com\/watchtowrlabs"
},
"html_url": "https:\/\/github.com\/watchtowrlabs\/CVE-2024-4577",
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-06-10T01:11:42Z",
"pushed_at": "2024-06-07T09:53:15Z",
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 76,
"score": 0,
"subscribers_count": 2
},
{
"id": 811787647,
"name": "CVE-2024-4577",
"full_name": "zjhzjhhh\/CVE-2024-4577",
"owner": {
"login": "zjhzjhhh",
"id": 64487620,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64487620?v=4",
"html_url": "https:\/\/github.com\/zjhzjhhh"
},
"html_url": "https:\/\/github.com\/zjhzjhhh\/CVE-2024-4577",
"description": "CVE-2024-4577",
"fork": false,
"created_at": "2024-06-07T09:53:32Z",
"updated_at": "2024-06-07T09:53:32Z",
"pushed_at": "2024-06-07T09:53:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 811805923,
"name": "CVE-2024-4577-Nuclei-Template",
"full_name": "huseyinstif\/CVE-2024-4577-Nuclei-Template",
"owner": {
"login": "huseyinstif",
"id": 54823077,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54823077?v=4",
"html_url": "https:\/\/github.com\/huseyinstif"
},
"html_url": "https:\/\/github.com\/huseyinstif\/CVE-2024-4577-Nuclei-Template",
"description": null,
"fork": false,
"created_at": "2024-06-07T10:40:37Z",
"updated_at": "2024-06-08T22:33:25Z",
"pushed_at": "2024-06-07T15:06:52Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},
{
"id": 811813168,
"name": "CVE-2024-4577",
"full_name": "taida957789\/CVE-2024-4577",
"owner": {
"login": "taida957789",
"id": 3710930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3710930?v=4",
"html_url": "https:\/\/github.com\/taida957789"
},
"html_url": "https:\/\/github.com\/taida957789\/CVE-2024-4577",
"description": null,
"fork": false,
"created_at": "2024-06-07T10:58:57Z",
"updated_at": "2024-06-07T11:06:00Z",
"pushed_at": "2024-06-07T11:05:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 811856232,
"name": "CVE-2024-4577",
"full_name": "Wh02m1\/CVE-2024-4577",
"owner": {
"login": "Wh02m1",
"id": 21974999,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21974999?v=4",
"html_url": "https:\/\/github.com\/Wh02m1"
},
"html_url": "https:\/\/github.com\/Wh02m1\/CVE-2024-4577",
"description": null,
"fork": false,
"created_at": "2024-06-07T12:49:20Z",
"updated_at": "2024-06-09T12:50:40Z",
"pushed_at": "2024-06-07T14:29:09Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 811966277,
"name": "CVE-2024-4577",
"full_name": "Sysc4ll3r\/CVE-2024-4577",
"owner": {
"login": "Sysc4ll3r",
"id": 158176899,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/158176899?v=4",
"html_url": "https:\/\/github.com\/Sysc4ll3r"
},
"html_url": "https:\/\/github.com\/Sysc4ll3r\/CVE-2024-4577",
"description": "Nuclei Template for CVE-2024-4577",
"fork": false,
"created_at": "2024-06-07T17:01:20Z",
"updated_at": "2024-06-07T18:41:20Z",
"pushed_at": "2024-06-07T18:41:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 811966807,
"name": "CVE-2024-4577-RCE-EXP",
"full_name": "WanLiChangChengWanLiChang\/CVE-2024-4577-RCE-EXP",
"owner": {
"login": "WanLiChangChengWanLiChang",
"id": 171075497,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171075497?v=4",
"html_url": "https:\/\/github.com\/WanLiChangChengWanLiChang"
},
"html_url": "https:\/\/github.com\/WanLiChangChengWanLiChang\/CVE-2024-4577-RCE-EXP",
"description": null,
"fork": false,
"created_at": "2024-06-07T17:02:52Z",
"updated_at": "2024-06-07T17:26:21Z",
"pushed_at": "2024-06-07T17:26:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 812032307,
"name": "CVE-2024-4577",
"full_name": "Yukiioz\/CVE-2024-4577",
"owner": {
"login": "Yukiioz",
"id": 26349077,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26349077?v=4",
"html_url": "https:\/\/github.com\/Yukiioz"
},
"html_url": "https:\/\/github.com\/Yukiioz\/CVE-2024-4577",
"description": null,
"fork": false,
"created_at": "2024-06-07T20:10:49Z",
"updated_at": "2024-06-07T20:35:09Z",
"pushed_at": "2024-06-07T20:35:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 812126791,
"name": "CVE-2024-4577-nuclei",
"full_name": "0x20c\/CVE-2024-4577-nuclei",
"owner": {
"login": "0x20c",
"id": 25526653,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25526653?v=4",
"html_url": "https:\/\/github.com\/0x20c"
},
"html_url": "https:\/\/github.com\/0x20c\/CVE-2024-4577-nuclei",
"description": "CVE-2024-4577 nuclei-templates",
"fork": false,
"created_at": "2024-06-08T03:12:28Z",
"updated_at": "2024-06-10T02:18:29Z",
"pushed_at": "2024-06-08T04:14:28Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 812155900,
"name": "CVE-2024-4577",
"full_name": "manuelinfosec\/CVE-2024-4577",
"owner": {
"login": "manuelinfosec",
"id": 47338716,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47338716?v=4",
"html_url": "https:\/\/github.com\/manuelinfosec"
},
"html_url": "https:\/\/github.com\/manuelinfosec\/CVE-2024-4577",
"description": "Proof Of Concept RCE exploit for critical vulnerability in PHP <8.2.15 (Windows), allowing attackers to execute arbitrary commands.",
"fork": false,
"created_at": "2024-06-08T05:27:44Z",
"updated_at": "2024-06-09T16:48:20Z",
"pushed_at": "2024-06-08T05:50:27Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 812174425,
"name": "CVE-2024-4577",
"full_name": "zomasec\/CVE-2024-4577",
"owner": {
"login": "zomasec",
"id": 118324667,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118324667?v=4",
"html_url": "https:\/\/github.com\/zomasec"
},
"html_url": "https:\/\/github.com\/zomasec\/CVE-2024-4577",
"description": "CVE-2024-4577 Exploit POC ",
"fork": false,
"created_at": "2024-06-08T06:36:14Z",
"updated_at": "2024-06-09T10:50:42Z",
"pushed_at": "2024-06-09T16:47:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 812271703,
"name": "CVE-2024-4577-PHP-RCE",
"full_name": "ZephrFish\/CVE-2024-4577-PHP-RCE",
"owner": {
"login": "ZephrFish",
"id": 5783068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
"html_url": "https:\/\/github.com\/ZephrFish"
},
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2024-4577-PHP-RCE",
"description": "PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template",
"fork": false,
"created_at": "2024-06-08T12:23:35Z",
"updated_at": "2024-06-10T02:12:37Z",
"pushed_at": "2024-06-08T15:59:27Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-4577",
"pentest",
"php",
"poc",
"rce-exploit",
"redteam"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 812283983,
"name": "CVE-2024-4577-PHP-RCE",
"full_name": "xcanwin\/CVE-2024-4577-PHP-RCE",
"owner": {
"login": "xcanwin",
"id": 14187349,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14187349?v=4",
"html_url": "https:\/\/github.com\/xcanwin"
},
"html_url": "https:\/\/github.com\/xcanwin\/CVE-2024-4577-PHP-RCE",
"description": "全球首款利用PHP默认环境的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP共享原创EXP支持SSRF支持绕过WAF。The world's first CVE-2024-4577 PHP-CGI RCE exploit utilizing the default PHP environment. Sharing original exploit, supports SSRF, supports WAF bypass.",
"fork": false,
"created_at": "2024-06-08T13:04:45Z",
"updated_at": "2024-06-10T05:35:25Z",
"pushed_at": "2024-06-09T15:45:15Z",
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bypass",
"cve-2024-4577",
"php",
"php-cgi",
"rce",
"waf",
"xampp"
],
"visibility": "public",
"forks": 6,
"watchers": 33,
"score": 0,
"subscribers_count": 1
},
{
"id": 812648512,
"name": "CVE-2024-4577",
"full_name": "dbyMelina\/CVE-2024-4577",
"owner": {
"login": "dbyMelina",
"id": 93864453,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93864453?v=4",
"html_url": "https:\/\/github.com\/dbyMelina"
},
"html_url": "https:\/\/github.com\/dbyMelina\/CVE-2024-4577",
"description": "python poc编写练手可以对单个目标或批量检测",
"fork": false,
"created_at": "2024-06-09T13:46:46Z",
"updated_at": "2024-06-09T13:48:02Z",
"pushed_at": "2024-06-09T13:47:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 812658588,
"name": "CVE-2024-4577",
"full_name": "Chocapikk\/CVE-2024-4577",
"owner": {
"login": "Chocapikk",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Chocapikk"
},
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-4577",
"description": "PHP CGI Argument Injection vulnerability",
"fork": false,
"created_at": "2024-06-09T14:18:21Z",
"updated_at": "2024-06-10T02:07:46Z",
"pushed_at": "2024-06-09T14:20:36Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 812806796,
"name": "CVE-2024-4577-EXPLOIT",
"full_name": "K3ysTr0K3R\/CVE-2024-4577-EXPLOIT",
"owner": {
"login": "K3ysTr0K3R",
"id": 70909693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
"html_url": "https:\/\/github.com\/K3ysTr0K3R"
},
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2024-4577-EXPLOIT",
"description": null,
"fork": false,
"created_at": "2024-06-09T23:32:11Z",
"updated_at": "2024-06-09T23:32:15Z",
"pushed_at": "2024-06-09T23:32:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]