PoC-in-GitHub/2024/CVE-2024-21887.json

157 lines
5.6 KiB
JSON
Raw Normal View History

2024-06-26 15:47:13 +09:00
[
{
"id": 745015590,
"name": "CVE-2023-46805_CVE-2024-21887",
"full_name": "raminkarimkhani1996\/CVE-2023-46805_CVE-2024-21887",
"owner": {
"login": "raminkarimkhani1996",
"id": 26582031,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26582031?v=4",
"html_url": "https:\/\/github.com\/raminkarimkhani1996"
},
"html_url": "https:\/\/github.com\/raminkarimkhani1996\/CVE-2023-46805_CVE-2024-21887",
"description": "The script in this repository only checks whether the vulnerabilities specified in the Ivanti Connect Secure product exist.",
"fork": false,
"created_at": "2024-01-18T13:25:46Z",
"updated_at": "2024-04-30T02:04:11Z",
"pushed_at": "2024-03-23T14:52:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 745284788,
"name": "Ivanti-Connect-Around-Scan",
"full_name": "seajaysec\/Ivanti-Connect-Around-Scan",
"owner": {
"login": "seajaysec",
"id": 7016191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7016191?v=4",
"html_url": "https:\/\/github.com\/seajaysec"
},
"html_url": "https:\/\/github.com\/seajaysec\/Ivanti-Connect-Around-Scan",
"description": "Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.",
"fork": false,
"created_at": "2024-01-19T02:12:11Z",
"updated_at": "2024-04-05T07:44:30Z",
"pushed_at": "2024-02-03T01:59:49Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},
{
"id": 745384269,
"name": "CVE-2023-46805_CVE-2024-21887_scan_grouped",
"full_name": "mickdec\/CVE-2023-46805_CVE-2024-21887_scan_grouped",
"owner": {
"login": "mickdec",
"id": 33021266,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33021266?v=4",
"html_url": "https:\/\/github.com\/mickdec"
},
"html_url": "https:\/\/github.com\/mickdec\/CVE-2023-46805_CVE-2024-21887_scan_grouped",
"description": null,
"fork": false,
"created_at": "2024-01-19T08:11:31Z",
"updated_at": "2024-05-21T12:56:29Z",
"pushed_at": "2024-05-21T12:56:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 745995423,
"name": "CVE-2024-21887",
"full_name": "tucommenceapousser\/CVE-2024-21887",
"owner": {
"login": "tucommenceapousser",
"id": 129875733,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4",
"html_url": "https:\/\/github.com\/tucommenceapousser"
},
"html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2024-21887",
"description": "exploit for ivanti",
"fork": false,
"created_at": "2024-01-20T19:15:23Z",
"updated_at": "2024-06-06T13:41:03Z",
"pushed_at": "2024-01-20T19:20:25Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 755240791,
"name": "CVE-2024-21887",
"full_name": "imhunterand\/CVE-2024-21887",
"owner": {
"login": "imhunterand",
"id": 109766416,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109766416?v=4",
"html_url": "https:\/\/github.com\/imhunterand"
},
"html_url": "https:\/\/github.com\/imhunterand\/CVE-2024-21887",
"description": "Ivanti Connect Secure & Ivanti Policy Secure allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. (RCE Exploits)",
"fork": false,
"created_at": "2024-02-09T18:07:06Z",
"updated_at": "2024-03-24T21:09:47Z",
"pushed_at": "2024-02-09T18:08:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-21887",
"exploit-code",
"rce-exploit",
"remote-code-execution"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]