尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Really Simple Plugins | Really Simple Security Pro multisite | 9.0.0 ~ 9.1.1.1 | - | |
| rogierlankhorst | Really Simple Security – Simple and Performant Security (formerly Really Simple SSL) | 9.0.0 ~ 9.1.1.1 | - | |
| Really Simple Plugins | Really Simple Security Pro | 9.0.0 ~ 9.1.1.1 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 – 9.1.1.1 – Authentication Bypass | https://github.com/RandomRobbieBF/CVE-2024-10924 | POC详情 |
| 2 | CVE-2024-10924 Authentication Bypass Using an Alternate Path or Channel (CWE-288) | https://github.com/FoKiiin/CVE-2024-10924 | POC详情 |
| 3 | WARNING: This is a vulnerable application to test the exploit for the Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924). Run it at your own risk! | https://github.com/m3ssap0/wordpress-really-simple-security-authn-bypass-vulnerable-application | POC详情 |
| 4 | Simple Python script | https://github.com/MattJButler/CVE-2024-10924 | POC详情 |
| 5 | Exploits Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924). | https://github.com/m3ssap0/wordpress-really-simple-security-authn-bypass-exploit | POC详情 |
| 6 | None | https://github.com/julesbsz/CVE-2024-10924 | POC详情 |
| 7 | Exploit for CVE-2024-10924 -> Really Simple Security < 9.1.2 authentication bypass | https://github.com/dua1337/Exploit-for-CVE-2024-10924 | POC详情 |
| 8 | Bypass del MFA en WordPress con el plugin Really Simple Security instalado entre las versiones 9.0.0 – 9.1.1.1. | https://github.com/Maalfer/CVE-2024-10924-PoC | POC详情 |
| 9 | None | https://github.com/D1se0/CVE-2024-10924-Bypass-MFA-Wordpress-LAB | POC详情 |
| 10 | None | https://github.com/Hunt3r850/CVE-2024-10924-PoC | POC详情 |
| 11 | None | https://github.com/Hunt3r850/CVE-2024-10924-Wordpress-Docker | POC详情 |
| 12 | Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 - 9.1.1.1 - Authentication Bypass | https://github.com/Nxploited/CVE-2024-10924-Exploit | POC详情 |
| 13 | None | https://github.com/cy3erdr4g0n/CVE-2024-10924 | POC详情 |
| 14 | A Proof-of-Concept (PoC) exploit for CVE-2024-10924, a vulnerability in the Really Simple SSL WordPress plugin that allows bypassing two-factor authentication (2FA). Includes mitigation techniques to secure affected WordPress sites. | https://github.com/h8sU/wordpress-cve-2024-10924-exploit | POC详情 |
| 15 | None | https://github.com/sariamubeen/CVE-2024-10924 | POC详情 |
| 16 | WordPress CVE-2024-10924 Exploit for Really Simple Security plugin | https://github.com/MaleeshaUdan/wordpress-CVE-2024-10924--exploit | POC详情 |
| 17 | CVE-2024-10924 - Authentication Bypass in ReallySimpleSSL Wordpress Plugin | https://github.com/sharafu-sblsec/CVE-2024-10924 | POC详情 |
| 18 | None | https://github.com/OliveiraaX/-CVE-2024-10924 | POC详情 |
| 19 | The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default). | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-10924.yaml | POC详情 |
| 20 | None | https://github.com/ademto/wordpress-cve-2024-10924-pentest | POC详情 |
| 21 | None | https://github.com/bodoinon/CVE-2024-10924 | POC详情 |
| 22 | Unauthenticated authentication bypass to RCE exploit for CVE-2024-10924. Abuses an authentication and 2FA bypass in the Really Simple Security WordPress plugin to impersonate an admin user, upload a malicious plugin, and achieve remote command execution via an interactive shell. | https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-10924 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论