mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
286 lines
No EOL
10 KiB
JSON
286 lines
No EOL
10 KiB
JSON
[
|
||
{
|
||
"id": 890817341,
|
||
"name": "palo-alto-panos-cve-2024-0012",
|
||
"full_name": "watchtowrlabs\/palo-alto-panos-cve-2024-0012",
|
||
"owner": {
|
||
"login": "watchtowrlabs",
|
||
"id": 99977116,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99977116?v=4",
|
||
"html_url": "https:\/\/github.com\/watchtowrlabs",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/watchtowrlabs\/palo-alto-panos-cve-2024-0012",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2024-11-19T08:29:32Z",
|
||
"updated_at": "2025-01-02T13:11:27Z",
|
||
"pushed_at": "2024-11-19T09:28:42Z",
|
||
"stargazers_count": 25,
|
||
"watchers_count": 25,
|
||
"has_discussions": false,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 25,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 890899855,
|
||
"name": "CVE-2024-0012-POC",
|
||
"full_name": "Sachinart\/CVE-2024-0012-POC",
|
||
"owner": {
|
||
"login": "Sachinart",
|
||
"id": 18497191,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18497191?v=4",
|
||
"html_url": "https:\/\/github.com\/Sachinart",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Sachinart\/CVE-2024-0012-POC",
|
||
"description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC",
|
||
"fork": false,
|
||
"created_at": "2024-11-19T11:30:25Z",
|
||
"updated_at": "2024-12-05T00:53:26Z",
|
||
"pushed_at": "2024-11-19T11:37:09Z",
|
||
"stargazers_count": 15,
|
||
"watchers_count": 15,
|
||
"has_discussions": false,
|
||
"forks_count": 5,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 5,
|
||
"watchers": 15,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 891583314,
|
||
"name": "CVE-2024-0012",
|
||
"full_name": "greaselovely\/CVE-2024-0012",
|
||
"owner": {
|
||
"login": "greaselovely",
|
||
"id": 71092239,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71092239?v=4",
|
||
"html_url": "https:\/\/github.com\/greaselovely",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/greaselovely\/CVE-2024-0012",
|
||
"description": "PANW NGFW CVE-2024-0012",
|
||
"fork": false,
|
||
"created_at": "2024-11-20T15:35:29Z",
|
||
"updated_at": "2025-01-15T02:26:18Z",
|
||
"pushed_at": "2024-11-22T20:10:20Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 891832016,
|
||
"name": "CVE-2024-0012",
|
||
"full_name": "VegetableLasagne\/CVE-2024-0012",
|
||
"owner": {
|
||
"login": "VegetableLasagne",
|
||
"id": 118773543,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118773543?v=4",
|
||
"html_url": "https:\/\/github.com\/VegetableLasagne",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/VegetableLasagne\/CVE-2024-0012",
|
||
"description": "Palo Alto CVE-2024-0012 Exploit POC",
|
||
"fork": false,
|
||
"created_at": "2024-11-21T03:08:00Z",
|
||
"updated_at": "2024-11-21T03:08:47Z",
|
||
"pushed_at": "2024-11-21T03:08:44Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 892487345,
|
||
"name": "CVE-2024-0012-poc",
|
||
"full_name": "iSee857\/CVE-2024-0012-poc",
|
||
"owner": {
|
||
"login": "iSee857",
|
||
"id": 73977770,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73977770?v=4",
|
||
"html_url": "https:\/\/github.com\/iSee857",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/iSee857\/CVE-2024-0012-poc",
|
||
"description": "CVE-2024-0012批量检测脚本",
|
||
"fork": false,
|
||
"created_at": "2024-11-22T07:52:11Z",
|
||
"updated_at": "2024-11-26T07:38:23Z",
|
||
"pushed_at": "2024-11-26T07:38:20Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 892650578,
|
||
"name": "cve-2024-0012-poc",
|
||
"full_name": "XiaomingX\/cve-2024-0012-poc",
|
||
"owner": {
|
||
"login": "XiaomingX",
|
||
"id": 5387930,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
|
||
"html_url": "https:\/\/github.com\/XiaomingX",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-0012-poc",
|
||
"description": "CVE-2024-0012是Palo Alto Networks PAN-OS软件中的一个身份验证绕过漏洞。该漏洞允许未经身份验证的攻击者通过网络访问管理Web界面,获取PAN-OS管理员权限,从而执行管理操作、篡改配置,或利用其他需要身份验证的特权提升漏洞(如CVE-2024-9474) ",
|
||
"fork": false,
|
||
"created_at": "2024-11-22T14:11:56Z",
|
||
"updated_at": "2025-01-13T18:17:29Z",
|
||
"pushed_at": "2024-11-22T14:37:04Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 892819901,
|
||
"name": "Paloalto-CVE-2024-0012",
|
||
"full_name": "punitdarji\/Paloalto-CVE-2024-0012",
|
||
"owner": {
|
||
"login": "punitdarji",
|
||
"id": 38101321,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38101321?v=4",
|
||
"html_url": "https:\/\/github.com\/punitdarji",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/punitdarji\/Paloalto-CVE-2024-0012",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2024-11-22T20:58:17Z",
|
||
"updated_at": "2024-11-22T21:00:08Z",
|
||
"pushed_at": "2024-11-22T21:00:04Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 896532665,
|
||
"name": "CVE-2024-0012",
|
||
"full_name": "0xjessie21\/CVE-2024-0012",
|
||
"owner": {
|
||
"login": "0xjessie21",
|
||
"id": 2928054,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2928054?v=4",
|
||
"html_url": "https:\/\/github.com\/0xjessie21",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0xjessie21\/CVE-2024-0012",
|
||
"description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC",
|
||
"fork": false,
|
||
"created_at": "2024-11-30T16:06:02Z",
|
||
"updated_at": "2024-12-02T02:33:44Z",
|
||
"pushed_at": "2024-12-02T02:33:40Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve",
|
||
"cve-2024-0012",
|
||
"exploit",
|
||
"paloaltonetworks"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 902007048,
|
||
"name": "CVE-2024-0012_CVE-2024-9474_PoC",
|
||
"full_name": "TalatumLabs\/CVE-2024-0012_CVE-2024-9474_PoC",
|
||
"owner": {
|
||
"login": "TalatumLabs",
|
||
"id": 191394406,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/191394406?v=4",
|
||
"html_url": "https:\/\/github.com\/TalatumLabs",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/TalatumLabs\/CVE-2024-0012_CVE-2024-9474_PoC",
|
||
"description": "This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution.",
|
||
"fork": false,
|
||
"created_at": "2024-12-11T18:13:32Z",
|
||
"updated_at": "2024-12-14T02:34:33Z",
|
||
"pushed_at": "2024-12-12T15:48:10Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
}
|
||
] |