cve/2024/CVE-2024-27956.md
2025-09-29 16:08:36 +00:00

70 lines
3.1 KiB
Markdown

### [CVE-2024-27956](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27956)
![](https://img.shields.io/static/v1?label=Product&message=Automatic&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brighgreen)
### Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0day404/HV-2024-POC
- https://github.com/12442RF/POC
- https://github.com/7aRanchi/CVE-2024-27956-for-fscan
- https://github.com/AboSteam/POPC
- https://github.com/AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956
- https://github.com/AlienTec1908/Matrioshka_HackMyVM_Medium
- https://github.com/CERTologists/EXPLOITING-CVE-2024-27956
- https://github.com/Cappricio-Securities/CVE-2024-27956
- https://github.com/DMW11525708/wiki
- https://github.com/DoTTak/Research-WordPress-CVE
- https://github.com/FoxyProxys/CVE-2024-27956
- https://github.com/Lern0n/Lernon-POC
- https://github.com/Linxloop/fork_POC
- https://github.com/NaInSec/CVE-LIST
- https://github.com/Ostorlab/KEV
- https://github.com/Professor6T9/WordPressAutoExploiter
- https://github.com/TadashiJei/Valve-Press-CVE-2024-27956-RCE
- https://github.com/ThatNotEasy/CVE-2024-27956
- https://github.com/W3BW/CVE-2024-27956-RCE-File-Package
- https://github.com/WhosGa/MyWiki
- https://github.com/X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN
- https://github.com/Yuan08o/pocs
- https://github.com/ZonghaoLi777/githubTrending
- https://github.com/admin772/POC
- https://github.com/adminlove520/pocWiki
- https://github.com/adysec/POC
- https://github.com/amessedad/autoexploitGPT
- https://github.com/aneasystone/github-trending
- https://github.com/cisp-pte/POC-20241008-sec-fork
- https://github.com/cve-2024/CVE-2024-27956-RCE
- https://github.com/devsec23/CVE-2024-27956
- https://github.com/diego-tella/CVE-2024-27956-RCE
- https://github.com/eeeeeeeeee-code/POC
- https://github.com/fireinrain/github-trending
- https://github.com/greenberglinken/2023hvv_1
- https://github.com/iemotion/POC
- https://github.com/itzheartzz/MASS-CVE-2024-27956
- https://github.com/johe123qwe/github-trending
- https://github.com/k3ppf0r/CVE-2024-27956
- https://github.com/laoa1573/wy876
- https://github.com/m4nInTh3mIdDle/wordpress-CVE-2024-27956
- https://github.com/nancyariah4/CVE-2024-27956
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/oLy0/Vulnerability
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/sampsonv/github-trending
- https://github.com/tanjiti/sec_profile
- https://github.com/truonghuuphuc/CVE-2024-27956
- https://github.com/truonghuuphuc/Poc
- https://github.com/wjlin0/poc-doc
- https://github.com/wy876/POC
- https://github.com/wy876/wiki
- https://github.com/zhaoxiaoha/github-trending