[ { "id": 890817341, "name": "palo-alto-panos-cve-2024-0012", "full_name": "watchtowrlabs\/palo-alto-panos-cve-2024-0012", "owner": { "login": "watchtowrlabs", "id": 99977116, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99977116?v=4", "html_url": "https:\/\/github.com\/watchtowrlabs", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/watchtowrlabs\/palo-alto-panos-cve-2024-0012", "description": null, "fork": false, "created_at": "2024-11-19T08:29:32Z", "updated_at": "2024-12-11T04:43:45Z", "pushed_at": "2024-11-19T09:28:42Z", "stargazers_count": 24, "watchers_count": 24, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 24, "score": 0, "subscribers_count": 1 }, { "id": 890899855, "name": "CVE-2024-0012-POC", "full_name": "Sachinart\/CVE-2024-0012-POC", "owner": { "login": "Sachinart", "id": 18497191, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18497191?v=4", "html_url": "https:\/\/github.com\/Sachinart", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Sachinart\/CVE-2024-0012-POC", "description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC", "fork": false, "created_at": "2024-11-19T11:30:25Z", "updated_at": "2024-12-05T00:53:26Z", "pushed_at": "2024-11-19T11:37:09Z", "stargazers_count": 15, "watchers_count": 15, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 15, "score": 0, "subscribers_count": 1 }, { "id": 891583314, "name": "CVE-2024-0012", "full_name": "greaselovely\/CVE-2024-0012", "owner": { "login": "greaselovely", "id": 71092239, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71092239?v=4", "html_url": "https:\/\/github.com\/greaselovely", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/greaselovely\/CVE-2024-0012", "description": "PANW NGFW CVE-2024-0012", "fork": false, "created_at": "2024-11-20T15:35:29Z", "updated_at": "2024-11-22T20:10:24Z", "pushed_at": "2024-11-22T20:10:20Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 891832016, "name": "CVE-2024-0012", "full_name": "VegetableLasagne\/CVE-2024-0012", "owner": { "login": "VegetableLasagne", "id": 118773543, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118773543?v=4", "html_url": "https:\/\/github.com\/VegetableLasagne", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/VegetableLasagne\/CVE-2024-0012", "description": "Palo Alto CVE-2024-0012 Exploit POC", "fork": false, "created_at": "2024-11-21T03:08:00Z", "updated_at": "2024-11-21T03:08:47Z", "pushed_at": "2024-11-21T03:08:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 892487345, "name": "CVE-2024-0012-poc", "full_name": "iSee857\/CVE-2024-0012-poc", "owner": { "login": "iSee857", "id": 73977770, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73977770?v=4", "html_url": "https:\/\/github.com\/iSee857", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/iSee857\/CVE-2024-0012-poc", "description": "CVE-2024-0012批量检测脚本", "fork": false, "created_at": "2024-11-22T07:52:11Z", "updated_at": "2024-11-26T07:38:23Z", "pushed_at": "2024-11-26T07:38:20Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 892650578, "name": "cve-2024-0012-poc", "full_name": "XiaomingX\/cve-2024-0012-poc", "owner": { "login": "XiaomingX", "id": 5387930, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", "html_url": "https:\/\/github.com\/XiaomingX", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-0012-poc", "description": "CVE-2024-0012是Palo Alto Networks PAN-OS软件中的一个身份验证绕过漏洞。该漏洞允许未经身份验证的攻击者通过网络访问管理Web界面,获取PAN-OS管理员权限,从而执行管理操作、篡改配置,或利用其他需要身份验证的特权提升漏洞(如CVE-2024-9474) ", "fork": false, "created_at": "2024-11-22T14:11:56Z", "updated_at": "2024-12-08T18:37:20Z", "pushed_at": "2024-11-22T14:37:04Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 892819901, "name": "Paloalto-CVE-2024-0012", "full_name": "punitdarji\/Paloalto-CVE-2024-0012", "owner": { "login": "punitdarji", "id": 38101321, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38101321?v=4", "html_url": "https:\/\/github.com\/punitdarji", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/punitdarji\/Paloalto-CVE-2024-0012", "description": null, "fork": false, "created_at": "2024-11-22T20:58:17Z", "updated_at": "2024-11-22T21:00:08Z", "pushed_at": "2024-11-22T21:00:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 896532665, "name": "CVE-2024-0012", "full_name": "0xjessie21\/CVE-2024-0012", "owner": { "login": "0xjessie21", "id": 2928054, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2928054?v=4", "html_url": "https:\/\/github.com\/0xjessie21", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xjessie21\/CVE-2024-0012", "description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC", "fork": false, "created_at": "2024-11-30T16:06:02Z", "updated_at": "2024-12-02T02:33:44Z", "pushed_at": "2024-12-02T02:33:40Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2024-0012", "exploit", "paloaltonetworks" ], "visibility": "public", "forks": 3, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 902007048, "name": "CVE-2024-0012_CVE-2024-9474_PoC", "full_name": "TalatumLabs\/CVE-2024-0012_CVE-2024-9474_PoC", "owner": { "login": "TalatumLabs", "id": 191394406, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/191394406?v=4", "html_url": "https:\/\/github.com\/TalatumLabs", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/TalatumLabs\/CVE-2024-0012_CVE-2024-9474_PoC", "description": "This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution.", "fork": false, "created_at": "2024-12-11T18:13:32Z", "updated_at": "2024-12-14T02:34:33Z", "pushed_at": "2024-12-12T15:48:10Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 3, "score": 0, "subscribers_count": 1 } ]