PoC-in-GitHub/2024/CVE-2024-0012.json
2025-01-15 15:32:14 +09:00

286 lines
No EOL
10 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 890817341,
"name": "palo-alto-panos-cve-2024-0012",
"full_name": "watchtowrlabs\/palo-alto-panos-cve-2024-0012",
"owner": {
"login": "watchtowrlabs",
"id": 99977116,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99977116?v=4",
"html_url": "https:\/\/github.com\/watchtowrlabs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/watchtowrlabs\/palo-alto-panos-cve-2024-0012",
"description": null,
"fork": false,
"created_at": "2024-11-19T08:29:32Z",
"updated_at": "2025-01-02T13:11:27Z",
"pushed_at": "2024-11-19T09:28:42Z",
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 25,
"score": 0,
"subscribers_count": 1
},
{
"id": 890899855,
"name": "CVE-2024-0012-POC",
"full_name": "Sachinart\/CVE-2024-0012-POC",
"owner": {
"login": "Sachinart",
"id": 18497191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18497191?v=4",
"html_url": "https:\/\/github.com\/Sachinart",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Sachinart\/CVE-2024-0012-POC",
"description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC",
"fork": false,
"created_at": "2024-11-19T11:30:25Z",
"updated_at": "2024-12-05T00:53:26Z",
"pushed_at": "2024-11-19T11:37:09Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},
{
"id": 891583314,
"name": "CVE-2024-0012",
"full_name": "greaselovely\/CVE-2024-0012",
"owner": {
"login": "greaselovely",
"id": 71092239,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71092239?v=4",
"html_url": "https:\/\/github.com\/greaselovely",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/greaselovely\/CVE-2024-0012",
"description": "PANW NGFW CVE-2024-0012",
"fork": false,
"created_at": "2024-11-20T15:35:29Z",
"updated_at": "2025-01-15T02:26:18Z",
"pushed_at": "2024-11-22T20:10:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 891832016,
"name": "CVE-2024-0012",
"full_name": "VegetableLasagne\/CVE-2024-0012",
"owner": {
"login": "VegetableLasagne",
"id": 118773543,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118773543?v=4",
"html_url": "https:\/\/github.com\/VegetableLasagne",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/VegetableLasagne\/CVE-2024-0012",
"description": "Palo Alto CVE-2024-0012 Exploit POC",
"fork": false,
"created_at": "2024-11-21T03:08:00Z",
"updated_at": "2024-11-21T03:08:47Z",
"pushed_at": "2024-11-21T03:08:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 892487345,
"name": "CVE-2024-0012-poc",
"full_name": "iSee857\/CVE-2024-0012-poc",
"owner": {
"login": "iSee857",
"id": 73977770,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73977770?v=4",
"html_url": "https:\/\/github.com\/iSee857",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/iSee857\/CVE-2024-0012-poc",
"description": "CVE-2024-0012批量检测脚本",
"fork": false,
"created_at": "2024-11-22T07:52:11Z",
"updated_at": "2024-11-26T07:38:23Z",
"pushed_at": "2024-11-26T07:38:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 892650578,
"name": "cve-2024-0012-poc",
"full_name": "XiaomingX\/cve-2024-0012-poc",
"owner": {
"login": "XiaomingX",
"id": 5387930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-0012-poc",
"description": "CVE-2024-0012是Palo Alto Networks PAN-OS软件中的一个身份验证绕过漏洞。该漏洞允许未经身份验证的攻击者通过网络访问管理Web界面获取PAN-OS管理员权限从而执行管理操作、篡改配置或利用其他需要身份验证的特权提升漏洞如CVE-2024-9474 ",
"fork": false,
"created_at": "2024-11-22T14:11:56Z",
"updated_at": "2025-01-13T18:17:29Z",
"pushed_at": "2024-11-22T14:37:04Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 892819901,
"name": "Paloalto-CVE-2024-0012",
"full_name": "punitdarji\/Paloalto-CVE-2024-0012",
"owner": {
"login": "punitdarji",
"id": 38101321,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38101321?v=4",
"html_url": "https:\/\/github.com\/punitdarji",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/punitdarji\/Paloalto-CVE-2024-0012",
"description": null,
"fork": false,
"created_at": "2024-11-22T20:58:17Z",
"updated_at": "2024-11-22T21:00:08Z",
"pushed_at": "2024-11-22T21:00:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 896532665,
"name": "CVE-2024-0012",
"full_name": "0xjessie21\/CVE-2024-0012",
"owner": {
"login": "0xjessie21",
"id": 2928054,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2928054?v=4",
"html_url": "https:\/\/github.com\/0xjessie21",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xjessie21\/CVE-2024-0012",
"description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC",
"fork": false,
"created_at": "2024-11-30T16:06:02Z",
"updated_at": "2024-12-02T02:33:44Z",
"pushed_at": "2024-12-02T02:33:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2024-0012",
"exploit",
"paloaltonetworks"
],
"visibility": "public",
"forks": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 902007048,
"name": "CVE-2024-0012_CVE-2024-9474_PoC",
"full_name": "TalatumLabs\/CVE-2024-0012_CVE-2024-9474_PoC",
"owner": {
"login": "TalatumLabs",
"id": 191394406,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/191394406?v=4",
"html_url": "https:\/\/github.com\/TalatumLabs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TalatumLabs\/CVE-2024-0012_CVE-2024-9474_PoC",
"description": "This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution.",
"fork": false,
"created_at": "2024-12-11T18:13:32Z",
"updated_at": "2024-12-14T02:34:33Z",
"pushed_at": "2024-12-12T15:48:10Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}
]