mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-30 03:20:10 +01:00
157 lines
5.6 KiB
JSON
157 lines
5.6 KiB
JSON
|
[
|
||
|
{
|
||
|
"id": 745015590,
|
||
|
"name": "CVE-2023-46805_CVE-2024-21887",
|
||
|
"full_name": "raminkarimkhani1996\/CVE-2023-46805_CVE-2024-21887",
|
||
|
"owner": {
|
||
|
"login": "raminkarimkhani1996",
|
||
|
"id": 26582031,
|
||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26582031?v=4",
|
||
|
"html_url": "https:\/\/github.com\/raminkarimkhani1996"
|
||
|
},
|
||
|
"html_url": "https:\/\/github.com\/raminkarimkhani1996\/CVE-2023-46805_CVE-2024-21887",
|
||
|
"description": "The script in this repository only checks whether the vulnerabilities specified in the Ivanti Connect Secure product exist.",
|
||
|
"fork": false,
|
||
|
"created_at": "2024-01-18T13:25:46Z",
|
||
|
"updated_at": "2024-04-30T02:04:11Z",
|
||
|
"pushed_at": "2024-03-23T14:52:22Z",
|
||
|
"stargazers_count": 4,
|
||
|
"watchers_count": 4,
|
||
|
"has_discussions": false,
|
||
|
"forks_count": 1,
|
||
|
"allow_forking": true,
|
||
|
"is_template": false,
|
||
|
"web_commit_signoff_required": false,
|
||
|
"topics": [],
|
||
|
"visibility": "public",
|
||
|
"forks": 1,
|
||
|
"watchers": 4,
|
||
|
"score": 0,
|
||
|
"subscribers_count": 1
|
||
|
},
|
||
|
{
|
||
|
"id": 745284788,
|
||
|
"name": "Ivanti-Connect-Around-Scan",
|
||
|
"full_name": "seajaysec\/Ivanti-Connect-Around-Scan",
|
||
|
"owner": {
|
||
|
"login": "seajaysec",
|
||
|
"id": 7016191,
|
||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7016191?v=4",
|
||
|
"html_url": "https:\/\/github.com\/seajaysec"
|
||
|
},
|
||
|
"html_url": "https:\/\/github.com\/seajaysec\/Ivanti-Connect-Around-Scan",
|
||
|
"description": "Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.",
|
||
|
"fork": false,
|
||
|
"created_at": "2024-01-19T02:12:11Z",
|
||
|
"updated_at": "2024-04-05T07:44:30Z",
|
||
|
"pushed_at": "2024-02-03T01:59:49Z",
|
||
|
"stargazers_count": 12,
|
||
|
"watchers_count": 12,
|
||
|
"has_discussions": false,
|
||
|
"forks_count": 3,
|
||
|
"allow_forking": true,
|
||
|
"is_template": false,
|
||
|
"web_commit_signoff_required": false,
|
||
|
"topics": [],
|
||
|
"visibility": "public",
|
||
|
"forks": 3,
|
||
|
"watchers": 12,
|
||
|
"score": 0,
|
||
|
"subscribers_count": 1
|
||
|
},
|
||
|
{
|
||
|
"id": 745384269,
|
||
|
"name": "CVE-2023-46805_CVE-2024-21887_scan_grouped",
|
||
|
"full_name": "mickdec\/CVE-2023-46805_CVE-2024-21887_scan_grouped",
|
||
|
"owner": {
|
||
|
"login": "mickdec",
|
||
|
"id": 33021266,
|
||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33021266?v=4",
|
||
|
"html_url": "https:\/\/github.com\/mickdec"
|
||
|
},
|
||
|
"html_url": "https:\/\/github.com\/mickdec\/CVE-2023-46805_CVE-2024-21887_scan_grouped",
|
||
|
"description": null,
|
||
|
"fork": false,
|
||
|
"created_at": "2024-01-19T08:11:31Z",
|
||
|
"updated_at": "2024-05-21T12:56:29Z",
|
||
|
"pushed_at": "2024-05-21T12:56:25Z",
|
||
|
"stargazers_count": 0,
|
||
|
"watchers_count": 0,
|
||
|
"has_discussions": false,
|
||
|
"forks_count": 0,
|
||
|
"allow_forking": true,
|
||
|
"is_template": false,
|
||
|
"web_commit_signoff_required": false,
|
||
|
"topics": [],
|
||
|
"visibility": "public",
|
||
|
"forks": 0,
|
||
|
"watchers": 0,
|
||
|
"score": 0,
|
||
|
"subscribers_count": 1
|
||
|
},
|
||
|
{
|
||
|
"id": 745995423,
|
||
|
"name": "CVE-2024-21887",
|
||
|
"full_name": "tucommenceapousser\/CVE-2024-21887",
|
||
|
"owner": {
|
||
|
"login": "tucommenceapousser",
|
||
|
"id": 129875733,
|
||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4",
|
||
|
"html_url": "https:\/\/github.com\/tucommenceapousser"
|
||
|
},
|
||
|
"html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2024-21887",
|
||
|
"description": "exploit for ivanti",
|
||
|
"fork": false,
|
||
|
"created_at": "2024-01-20T19:15:23Z",
|
||
|
"updated_at": "2024-06-06T13:41:03Z",
|
||
|
"pushed_at": "2024-01-20T19:20:25Z",
|
||
|
"stargazers_count": 2,
|
||
|
"watchers_count": 2,
|
||
|
"has_discussions": false,
|
||
|
"forks_count": 1,
|
||
|
"allow_forking": true,
|
||
|
"is_template": false,
|
||
|
"web_commit_signoff_required": false,
|
||
|
"topics": [],
|
||
|
"visibility": "public",
|
||
|
"forks": 1,
|
||
|
"watchers": 2,
|
||
|
"score": 0,
|
||
|
"subscribers_count": 1
|
||
|
},
|
||
|
{
|
||
|
"id": 755240791,
|
||
|
"name": "CVE-2024-21887",
|
||
|
"full_name": "imhunterand\/CVE-2024-21887",
|
||
|
"owner": {
|
||
|
"login": "imhunterand",
|
||
|
"id": 109766416,
|
||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109766416?v=4",
|
||
|
"html_url": "https:\/\/github.com\/imhunterand"
|
||
|
},
|
||
|
"html_url": "https:\/\/github.com\/imhunterand\/CVE-2024-21887",
|
||
|
"description": "Ivanti Connect Secure & Ivanti Policy Secure allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. (RCE Exploits)",
|
||
|
"fork": false,
|
||
|
"created_at": "2024-02-09T18:07:06Z",
|
||
|
"updated_at": "2024-03-24T21:09:47Z",
|
||
|
"pushed_at": "2024-02-09T18:08:04Z",
|
||
|
"stargazers_count": 1,
|
||
|
"watchers_count": 1,
|
||
|
"has_discussions": false,
|
||
|
"forks_count": 0,
|
||
|
"allow_forking": true,
|
||
|
"is_template": false,
|
||
|
"web_commit_signoff_required": false,
|
||
|
"topics": [
|
||
|
"cve-2024-21887",
|
||
|
"exploit-code",
|
||
|
"rce-exploit",
|
||
|
"remote-code-execution"
|
||
|
],
|
||
|
"visibility": "public",
|
||
|
"forks": 0,
|
||
|
"watchers": 1,
|
||
|
"score": 0,
|
||
|
"subscribers_count": 1
|
||
|
}
|
||
|
]
|