PoC-in-GitHub/2024/CVE-2024-21887.json

277 lines
10 KiB
JSON
Raw Normal View History

2024-01-14 13:39:35 +01:00
[
{
"id": 743084274,
"name": "ivanti-CVE-2024-21887",
"full_name": "oways\/ivanti-CVE-2024-21887",
"owner": {
"login": "oways",
"id": 11142952,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11142952?v=4",
"html_url": "https:\/\/github.com\/oways"
},
"html_url": "https:\/\/github.com\/oways\/ivanti-CVE-2024-21887",
"description": "POC Checker for ivanti CVE-2024-21887 Command injcetion",
"fork": false,
"created_at": "2024-01-14T09:25:56Z",
2024-01-21 07:26:46 +01:00
"updated_at": "2024-01-21T01:00:54Z",
2024-01-14 13:39:35 +01:00
"pushed_at": "2024-01-14T09:27:36Z",
2024-01-21 07:26:46 +01:00
"stargazers_count": 6,
"watchers_count": 6,
2024-01-14 13:39:35 +01:00
"has_discussions": false,
2024-01-17 07:40:17 +01:00
"forks_count": 1,
2024-01-14 13:39:35 +01:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-01-17 07:40:17 +01:00
"forks": 1,
2024-01-21 07:26:46 +01:00
"watchers": 6,
2024-01-14 19:42:49 +01:00
"score": 0,
2024-01-15 07:33:00 +01:00
"subscribers_count": 1
2024-01-17 01:34:44 +01:00
},
{
"id": 744186376,
"name": "CVE-2023-46805_CVE-2024-21887",
"full_name": "duy-31\/CVE-2023-46805_CVE-2024-21887",
"owner": {
"login": "duy-31",
"id": 20819326,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20819326?v=4",
"html_url": "https:\/\/github.com\/duy-31"
},
"html_url": "https:\/\/github.com\/duy-31\/CVE-2023-46805_CVE-2024-21887",
2024-01-29 19:26:09 +01:00
"description": "An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.",
2024-01-17 01:34:44 +01:00
"fork": false,
"created_at": "2024-01-16T19:40:59Z",
2024-03-02 07:26:43 +01:00
"updated_at": "2024-03-02T01:56:28Z",
2024-01-18 01:32:40 +01:00
"pushed_at": "2024-01-17T19:14:09Z",
2024-03-02 07:26:43 +01:00
"stargazers_count": 12,
"watchers_count": 12,
2024-01-17 01:34:44 +01:00
"has_discussions": false,
2024-02-21 01:26:32 +01:00
"forks_count": 3,
2024-01-17 01:34:44 +01:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-02-21 01:26:32 +01:00
"forks": 3,
2024-03-02 07:26:43 +01:00
"watchers": 12,
2024-01-17 01:34:44 +01:00
"score": 0,
2024-02-19 07:26:14 +01:00
"subscribers_count": 2
2024-01-17 01:34:44 +01:00
},
{
"id": 744213825,
"name": "CVE-2024-21887",
"full_name": "Chocapikk\/CVE-2024-21887",
"owner": {
"login": "Chocapikk",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Chocapikk"
},
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-21887",
"description": "A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.",
"fork": false,
"created_at": "2024-01-16T20:59:38Z",
2024-03-13 13:27:14 +01:00
"updated_at": "2024-03-13T11:26:36Z",
2024-01-17 07:40:17 +01:00
"pushed_at": "2024-01-17T00:38:28Z",
2024-03-13 13:27:14 +01:00
"stargazers_count": 41,
"watchers_count": 41,
2024-01-17 01:34:44 +01:00
"has_discussions": false,
2024-03-11 01:26:48 +01:00
"forks_count": 12,
2024-01-17 01:34:44 +01:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-03-11 01:26:48 +01:00
"forks": 12,
2024-03-13 13:27:14 +01:00
"watchers": 41,
2024-01-17 01:34:44 +01:00
"score": 0,
2024-01-17 07:40:17 +01:00
"subscribers_count": 1
2024-01-17 13:46:30 +01:00
},
{
"id": 744452699,
"name": "Check-Vulns-Script",
"full_name": "TheRedDevil1\/Check-Vulns-Script",
"owner": {
"login": "TheRedDevil1",
"id": 156904848,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156904848?v=4",
"html_url": "https:\/\/github.com\/TheRedDevil1"
},
"html_url": "https:\/\/github.com\/TheRedDevil1\/Check-Vulns-Script",
"description": "Here is a script to check vulns CVE-2023-46805 and CVE-2024-21887",
"fork": false,
"created_at": "2024-01-17T10:29:02Z",
2024-03-18 07:26:36 +01:00
"updated_at": "2024-03-18T04:20:06Z",
2024-01-17 13:46:30 +01:00
"pushed_at": "2024-01-17T10:35:15Z",
2024-03-18 07:26:36 +01:00
"stargazers_count": 4,
"watchers_count": 4,
2024-01-17 13:46:30 +01:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2024-03-18 07:26:36 +01:00
"watchers": 4,
2024-01-17 13:46:30 +01:00
"score": 0,
2024-01-18 07:29:25 +01:00
"subscribers_count": 1
2024-01-18 19:29:23 +01:00
},
{
"id": 745015590,
"name": "CVE-2023-46805_CVE-2024-21887",
"full_name": "raminkarimkhani1996\/CVE-2023-46805_CVE-2024-21887",
"owner": {
"login": "raminkarimkhani1996",
"id": 26582031,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26582031?v=4",
"html_url": "https:\/\/github.com\/raminkarimkhani1996"
},
"html_url": "https:\/\/github.com\/raminkarimkhani1996\/CVE-2023-46805_CVE-2024-21887",
"description": "The script in this repository only checks whether the vulnerabilities specified in the Ivanti Connect Secure product exist.",
"fork": false,
"created_at": "2024-01-18T13:25:46Z",
2024-02-19 13:26:42 +01:00
"updated_at": "2024-02-19T06:57:34Z",
2024-01-18 19:29:23 +01:00
"pushed_at": "2024-01-18T13:38:39Z",
2024-02-19 13:26:42 +01:00
"stargazers_count": 2,
"watchers_count": 2,
2024-01-18 19:29:23 +01:00
"has_discussions": false,
2024-02-07 19:26:20 +01:00
"forks_count": 1,
2024-01-18 19:29:23 +01:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-02-07 19:26:20 +01:00
"forks": 1,
2024-02-19 13:26:42 +01:00
"watchers": 2,
2024-01-18 19:29:23 +01:00
"score": 0,
2024-01-19 07:30:00 +01:00
"subscribers_count": 1
},
{
"id": 745284788,
"name": "Ivanti-Connect-Around-Scan",
"full_name": "seajaysec\/Ivanti-Connect-Around-Scan",
"owner": {
"login": "seajaysec",
"id": 7016191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7016191?v=4",
"html_url": "https:\/\/github.com\/seajaysec"
},
"html_url": "https:\/\/github.com\/seajaysec\/Ivanti-Connect-Around-Scan",
2024-01-21 07:26:46 +01:00
"description": "Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.",
2024-01-19 07:30:00 +01:00
"fork": false,
"created_at": "2024-01-19T02:12:11Z",
2024-02-21 01:26:32 +01:00
"updated_at": "2024-02-21T00:17:04Z",
2024-02-03 07:25:41 +01:00
"pushed_at": "2024-02-03T01:59:49Z",
2024-02-21 01:26:32 +01:00
"stargazers_count": 11,
"watchers_count": 11,
2024-01-19 13:41:14 +01:00
"has_discussions": false,
2024-02-12 19:27:03 +01:00
"forks_count": 3,
2024-01-19 13:41:14 +01:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-02-12 19:27:03 +01:00
"forks": 3,
2024-02-21 01:26:32 +01:00
"watchers": 11,
2024-01-19 13:41:14 +01:00
"score": 0,
2024-01-20 07:26:06 +01:00
"subscribers_count": 1
2024-01-19 13:41:14 +01:00
},
{
"id": 745384269,
"name": "CVE-2023-46805_CVE-2024-21887_scan_grouped",
"full_name": "mickdec\/CVE-2023-46805_CVE-2024-21887_scan_grouped",
"owner": {
"login": "mickdec",
"id": 33021266,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33021266?v=4",
"html_url": "https:\/\/github.com\/mickdec"
},
"html_url": "https:\/\/github.com\/mickdec\/CVE-2023-46805_CVE-2024-21887_scan_grouped",
"description": null,
"fork": false,
"created_at": "2024-01-19T08:11:31Z",
"updated_at": "2024-01-19T08:13:06Z",
"pushed_at": "2024-01-19T08:38:16Z",
2024-01-19 07:30:00 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-01-20 07:26:06 +01:00
"subscribers_count": 1
2024-01-21 01:26:08 +01:00
},
{
"id": 745995423,
"name": "CVE-2024-21887",
"full_name": "tucommenceapousser\/CVE-2024-21887",
"owner": {
"login": "tucommenceapousser",
"id": 129875733,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4",
"html_url": "https:\/\/github.com\/tucommenceapousser"
},
"html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2024-21887",
"description": "exploit for ivanti",
"fork": false,
"created_at": "2024-01-20T19:15:23Z",
2024-01-21 13:36:38 +01:00
"updated_at": "2024-01-21T12:09:30Z",
2024-01-21 01:26:08 +01:00
"pushed_at": "2024-01-20T19:20:25Z",
2024-01-21 13:36:38 +01:00
"stargazers_count": 1,
"watchers_count": 1,
2024-01-21 01:26:08 +01:00
"has_discussions": false,
2024-01-21 13:36:38 +01:00
"forks_count": 1,
2024-01-21 01:26:08 +01:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-01-21 13:36:38 +01:00
"forks": 1,
"watchers": 1,
2024-01-21 01:26:08 +01:00
"score": 0,
2024-01-21 07:26:46 +01:00
"subscribers_count": 1
2024-02-09 19:26:19 +01:00
},
{
"id": 755240791,
"name": "CVE-2024-21887",
"full_name": "imhunterand\/CVE-2024-21887",
"owner": {
"login": "imhunterand",
"id": 109766416,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109766416?v=4",
"html_url": "https:\/\/github.com\/imhunterand"
},
"html_url": "https:\/\/github.com\/imhunterand\/CVE-2024-21887",
"description": "Ivanti Connect Secure & Ivanti Policy Secure allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. (RCE Exploits)",
"fork": false,
"created_at": "2024-02-09T18:07:06Z",
"updated_at": "2024-02-09T18:08:57Z",
"pushed_at": "2024-02-09T18:08:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-21887",
"exploit-code",
"rce-exploit",
"remote-code-execution"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-02-10 07:25:50 +01:00
"subscribers_count": 1
2024-01-14 13:39:35 +01:00
}
]