PoC-in-GitHub/2024/CVE-2024-2961.json
2025-03-07 03:12:43 +09:00

157 lines
No EOL
5.7 KiB
JSON

[
{
"id": 806456046,
"name": "cnext-exploits",
"full_name": "ambionics\/cnext-exploits",
"owner": {
"login": "ambionics",
"id": 29630660,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29630660?v=4",
"html_url": "https:\/\/github.com\/ambionics",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ambionics\/cnext-exploits",
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2025-03-05T16:32:46Z",
"pushed_at": "2024-09-30T08:45:56Z",
"stargazers_count": 457,
"watchers_count": 457,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 57,
"watchers": 457,
"score": 0,
"subscribers_count": 8
},
{
"id": 924126046,
"name": "CVE-2024-2961",
"full_name": "4wayhandshake\/CVE-2024-2961",
"owner": {
"login": "4wayhandshake",
"id": 122475838,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122475838?v=4",
"html_url": "https:\/\/github.com\/4wayhandshake",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/4wayhandshake\/CVE-2024-2961",
"description": "Uses CVE-2024-2961 to perform an arbitrary file read",
"fork": false,
"created_at": "2025-01-29T13:15:11Z",
"updated_at": "2025-02-01T10:48:49Z",
"pushed_at": "2025-02-01T10:48:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 925889678,
"name": "exploit_cve-2023-26326_using_cve-2024-2961",
"full_name": "omarelshopky\/exploit_cve-2023-26326_using_cve-2024-2961",
"owner": {
"login": "omarelshopky",
"id": 69885253,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69885253?v=4",
"html_url": "https:\/\/github.com\/omarelshopky",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/omarelshopky\/exploit_cve-2023-26326_using_cve-2024-2961",
"description": "Exploit for CVE-2023-26326 in the WordPress BuddyForms plugin, leveraging CVE-2024-2961 for remote code execution. This exploit bypasses PHP 8+ deserialization limitations by chaining vulnerabilities with php:\/\/filter.",
"fork": false,
"created_at": "2025-02-02T01:35:43Z",
"updated_at": "2025-02-02T11:26:22Z",
"pushed_at": "2025-02-02T11:26:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 927144920,
"name": "CVE-2024-2961_buddyforms_2.7.7",
"full_name": "suce0155\/CVE-2024-2961_buddyforms_2.7.7",
"owner": {
"login": "suce0155",
"id": 149517309,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149517309?v=4",
"html_url": "https:\/\/github.com\/suce0155",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/suce0155\/CVE-2024-2961_buddyforms_2.7.7",
"description": "CVE-2024-2961 Cnext RCE Exploit with Buddyforms 2.7.7",
"fork": false,
"created_at": "2025-02-04T13:34:33Z",
"updated_at": "2025-03-03T04:39:46Z",
"pushed_at": "2025-02-04T18:51:48Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 935953693,
"name": "PHP-file-read-to-RCE-CVE-2024-2961-",
"full_name": "regantemudo\/PHP-file-read-to-RCE-CVE-2024-2961-",
"owner": {
"login": "regantemudo",
"id": 72595630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72595630?v=4",
"html_url": "https:\/\/github.com\/regantemudo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/regantemudo\/PHP-file-read-to-RCE-CVE-2024-2961-",
"description": "To use, implement the Remote class, which tells the exploit how to send the payload.",
"fork": false,
"created_at": "2025-02-20T09:41:37Z",
"updated_at": "2025-02-24T04:06:53Z",
"pushed_at": "2025-02-24T04:06:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]