PoC-in-GitHub/2024/CVE-2024-25600.json
2024-04-16 03:28:06 +09:00

170 lines
No EOL
6.1 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 760768451,
"name": "CVE-2024-25600",
"full_name": "Chocapikk\/CVE-2024-25600",
"owner": {
"login": "Chocapikk",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Chocapikk"
},
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-25600",
"description": "Unauthenticated Remote Code Execution Bricks <= 1.9.6",
"fork": false,
"created_at": "2024-02-20T20:16:09Z",
"updated_at": "2024-04-15T18:29:49Z",
"pushed_at": "2024-02-25T21:50:09Z",
"stargazers_count": 119,
"watchers_count": 119,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 119,
"score": 0,
"subscribers_count": 3
},
{
"id": 760947792,
"name": "CVE-2024-25600_Nuclei-Template",
"full_name": "Christbowel\/CVE-2024-25600_Nuclei-Template",
"owner": {
"login": "Christbowel",
"id": 96427513,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96427513?v=4",
"html_url": "https:\/\/github.com\/Christbowel"
},
"html_url": "https:\/\/github.com\/Christbowel\/CVE-2024-25600_Nuclei-Template",
"description": "Nuclei template and information about the POC for CVE-2024-25600",
"fork": false,
"created_at": "2024-02-21T00:27:33Z",
"updated_at": "2024-03-09T15:39:02Z",
"pushed_at": "2024-02-21T02:11:08Z",
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 26,
"score": 0,
"subscribers_count": 1
},
{
"id": 761713470,
"name": "CVE-2024-25600-Bricks-Builder-plugin-for-WordPress",
"full_name": "Tornad0007\/CVE-2024-25600-Bricks-Builder-plugin-for-WordPress",
"owner": {
"login": "Tornad0007",
"id": 93181695,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93181695?v=4",
"html_url": "https:\/\/github.com\/Tornad0007"
},
"html_url": "https:\/\/github.com\/Tornad0007\/CVE-2024-25600-Bricks-Builder-plugin-for-WordPress",
"description": "This tool is designed to exploit the CVE-2024-25600 vulnerability found in the Bricks Builder plugin for WordPress. The vulnerability allows for unauthenticated remote code execution on affected websites. The tool automates the exploitation process by retrieving nonces and sending specially crafted requests to execute arbitrary commands.",
"fork": false,
"created_at": "2024-02-22T10:53:45Z",
"updated_at": "2024-03-22T23:09:39Z",
"pushed_at": "2024-02-22T10:54:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 765397075,
"name": "CVE-2024-25600-wordpress-Exploit-RCE",
"full_name": "hy011121\/CVE-2024-25600-wordpress-Exploit-RCE",
"owner": {
"login": "hy011121",
"id": 75035965,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75035965?v=4",
"html_url": "https:\/\/github.com\/hy011121"
},
"html_url": "https:\/\/github.com\/hy011121\/CVE-2024-25600-wordpress-Exploit-RCE",
"description": "(Mirorring)",
"fork": false,
"created_at": "2024-02-29T20:53:42Z",
"updated_at": "2024-03-17T13:57:07Z",
"pushed_at": "2024-02-29T21:04:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 765618070,
"name": "CVE-2024-25600-EXPLOIT",
"full_name": "K3ysTr0K3R\/CVE-2024-25600-EXPLOIT",
"owner": {
"login": "K3ysTr0K3R",
"id": 70909693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
"html_url": "https:\/\/github.com\/K3ysTr0K3R"
},
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2024-25600-EXPLOIT",
"description": "A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-03-01T09:28:08Z",
"updated_at": "2024-04-15T14:22:20Z",
"pushed_at": "2024-03-01T09:46:56Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bricks-builder",
"cve-2024-25600",
"educational",
"exploit",
"exploitation",
"exploits",
"hacking",
"poc",
"rce",
"remote-code-execution",
"security-research",
"security-researcher",
"vulnerabilities",
"vulnerability",
"word",
"wordpress",
"wordpress-plugin"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]