PoC-in-GitHub/2024/CVE-2024-10924.json
2024-11-28 15:37:50 +09:00

239 lines
No EOL
8.6 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 888592127,
"name": "CVE-2024-10924",
"full_name": "RandomRobbieBF\/CVE-2024-10924",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10924",
"description": " Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 9.1.1.1 Authentication Bypass",
"fork": false,
"created_at": "2024-11-14T16:59:52Z",
"updated_at": "2024-11-21T00:35:21Z",
"pushed_at": "2024-11-14T17:00:59Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 890585149,
"name": "wordpress-really-simple-security-authn-bypass-vulnerable-application",
"full_name": "m3ssap0\/wordpress-really-simple-security-authn-bypass-vulnerable-application",
"owner": {
"login": "m3ssap0",
"id": 705120,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4",
"html_url": "https:\/\/github.com\/m3ssap0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/m3ssap0\/wordpress-really-simple-security-authn-bypass-vulnerable-application",
"description": "WARNING: This is a vulnerable application to test the exploit for the Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924). Run it at your own risk!",
"fork": false,
"created_at": "2024-11-18T20:37:07Z",
"updated_at": "2024-11-25T19:14:25Z",
"pushed_at": "2024-11-19T12:19:36Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"authentication-bypass",
"cve-2024-10924",
"really-simple-security",
"vulnerable-application",
"wordpress"
],
"visibility": "public",
"forks": 0,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 890703149,
"name": "CVE-2024-10924",
"full_name": "MattJButler\/CVE-2024-10924",
"owner": {
"login": "MattJButler",
"id": 90148954,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90148954?v=4",
"html_url": "https:\/\/github.com\/MattJButler",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MattJButler\/CVE-2024-10924",
"description": "Simple Python script",
"fork": false,
"created_at": "2024-11-19T03:06:49Z",
"updated_at": "2024-11-19T03:08:57Z",
"pushed_at": "2024-11-19T03:08:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 890862229,
"name": "wordpress-really-simple-security-authn-bypass-exploit",
"full_name": "m3ssap0\/wordpress-really-simple-security-authn-bypass-exploit",
"owner": {
"login": "m3ssap0",
"id": 705120,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4",
"html_url": "https:\/\/github.com\/m3ssap0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/m3ssap0\/wordpress-really-simple-security-authn-bypass-exploit",
"description": "Exploits Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924).",
"fork": false,
"created_at": "2024-11-19T10:07:28Z",
"updated_at": "2024-11-28T06:03:52Z",
"pushed_at": "2024-11-19T12:20:16Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-10924",
"exploit",
"really-simple-security",
"security",
"security-tools",
"vulnerability",
"vulnerability-scan",
"wordpress"
],
"visibility": "public",
"forks": 13,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},
{
"id": 891508423,
"name": "CVE-2024-10924",
"full_name": "julesbsz\/CVE-2024-10924",
"owner": {
"login": "julesbsz",
"id": 38622433,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38622433?v=4",
"html_url": "https:\/\/github.com\/julesbsz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/julesbsz\/CVE-2024-10924",
"description": "POC for CVE-2024-10924 written in Python",
"fork": false,
"created_at": "2024-11-20T13:13:15Z",
"updated_at": "2024-11-20T19:40:44Z",
"pushed_at": "2024-11-20T14:00:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-10924",
"python",
"really-simple-security",
"wordpress"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 891621160,
"name": "CVE-2024-10924-Wordpress-Docker",
"full_name": "Trackflaw\/CVE-2024-10924-Wordpress-Docker",
"owner": {
"login": "Trackflaw",
"id": 78696986,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78696986?v=4",
"html_url": "https:\/\/github.com\/Trackflaw",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Trackflaw\/CVE-2024-10924-Wordpress-Docker",
"description": "Vulnerable docker container for Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 9.1.1.1 Authentication Bypass CVE-2023-50164",
"fork": false,
"created_at": "2024-11-20T16:50:24Z",
"updated_at": "2024-11-25T19:41:23Z",
"pushed_at": "2024-11-22T09:28:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 894993174,
"name": "CVE-2024-10924-PoC",
"full_name": "Maalfer\/CVE-2024-10924-PoC",
"owner": {
"login": "Maalfer",
"id": 96432001,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96432001?v=4",
"html_url": "https:\/\/github.com\/Maalfer",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Maalfer\/CVE-2024-10924-PoC",
"description": "Bypass del MFA en WordPress con el plugin Really Simple Security instalado entre las versiones 9.0.0 9.1.1.1.",
"fork": false,
"created_at": "2024-11-27T11:19:47Z",
"updated_at": "2024-11-27T14:14:01Z",
"pushed_at": "2024-11-27T14:13:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]