cve/2024/CVE-2024-47177.md

47 lines
2.5 KiB
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-47177](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47177)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue)
### Description
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-47076, CVE-2024-47175, CVE-2024-47176. Reason: This candidate is a duplicate of CVE-2024-47076, CVE-2024-47175, and CVE-2024-47176. Notes: All CVE users should reference CVE-2024-47076, CVE-2024-47175, and/or CVE-2024-47176 instead of this candidate. This CVE was issued to a vulnerability that is dependent on CVE-2024-47076, CVE-2024-47175, and CVE-2024-47176. According to rule 4.2.15 of the CVE CNA rules, \"CNAs MUST NOT assign a different CVE ID to a Vulnerability that is fully interdependent with another Vulnerability. The Vulnerabilities are effectively the same single Vulnerability and MUST use one CVE ID.
### POC
#### Reference
2025-09-29 21:09:30 +02:00
- https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
- https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
- https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
- https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
2025-09-29 16:08:36 +00:00
#### Github
- https://github.com/0x7556/CVE-2024-47176
- https://github.com/0xCZR1/PoC-Cups-RCE-CVE-exploit-chain
- https://github.com/12442RF/POC
2025-09-29 21:09:30 +02:00
- https://github.com/782e616c6d/782e616c6d
2025-09-29 16:08:36 +00:00
- https://github.com/Alie-N/cups-vulnerability-exploit
2025-09-29 21:09:30 +02:00
- https://github.com/AxthonyV/CVE-2024-47176
2025-09-29 16:08:36 +00:00
- https://github.com/DMW11525708/wiki
- https://github.com/J1ezds/Vulnerability-Wiki-page
- https://github.com/Linxloop/fork_POC
- https://github.com/MalwareTech/CVE-2024-47176-Scanner
- https://github.com/Threekiii/Awesome-POC
- https://github.com/XiaomingX/awesome-poc-for-red-team
- https://github.com/adysec/POC
- https://github.com/cisp-pte/POC-20241008-sec-fork
2025-09-29 21:09:30 +02:00
- https://github.com/defronixpro/Defronix-Cybersecurity-Roadmap
2025-09-29 16:08:36 +00:00
- https://github.com/eeeeeeeeee-code/POC
- https://github.com/greenberglinken/2023hvv_1
- https://github.com/iemotion/POC
- https://github.com/l0n3m4n/CVE-2024-47176
- https://github.com/laoa1573/wy876
- https://github.com/lkarlslund/jugular
2025-09-29 21:09:30 +02:00
- https://github.com/nomi-sec/PoC-in-GitHub
2025-09-29 16:08:36 +00:00
- https://github.com/oLy0/Vulnerability
- https://github.com/plbplbp/loudong001
- https://github.com/referefref/cupspot-2024-47177
2025-09-29 21:09:30 +02:00
- https://github.com/wy876/POC
- https://github.com/wy876/wiki
2025-09-29 16:08:36 +00:00