mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
277 lines
No EOL
10 KiB
JSON
277 lines
No EOL
10 KiB
JSON
[
|
|
{
|
|
"id": 743084274,
|
|
"name": "ivanti-CVE-2024-21887",
|
|
"full_name": "oways\/ivanti-CVE-2024-21887",
|
|
"owner": {
|
|
"login": "oways",
|
|
"id": 11142952,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11142952?v=4",
|
|
"html_url": "https:\/\/github.com\/oways"
|
|
},
|
|
"html_url": "https:\/\/github.com\/oways\/ivanti-CVE-2024-21887",
|
|
"description": "POC Checker for ivanti CVE-2024-21887 Command injcetion",
|
|
"fork": false,
|
|
"created_at": "2024-01-14T09:25:56Z",
|
|
"updated_at": "2024-01-21T01:00:54Z",
|
|
"pushed_at": "2024-01-14T09:27:36Z",
|
|
"stargazers_count": 6,
|
|
"watchers_count": 6,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 6,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 744186376,
|
|
"name": "CVE-2023-46805_CVE-2024-21887",
|
|
"full_name": "duy-31\/CVE-2023-46805_CVE-2024-21887",
|
|
"owner": {
|
|
"login": "duy-31",
|
|
"id": 20819326,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20819326?v=4",
|
|
"html_url": "https:\/\/github.com\/duy-31"
|
|
},
|
|
"html_url": "https:\/\/github.com\/duy-31\/CVE-2023-46805_CVE-2024-21887",
|
|
"description": "An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.",
|
|
"fork": false,
|
|
"created_at": "2024-01-16T19:40:59Z",
|
|
"updated_at": "2024-03-02T01:56:28Z",
|
|
"pushed_at": "2024-01-17T19:14:09Z",
|
|
"stargazers_count": 12,
|
|
"watchers_count": 12,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 12,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 744213825,
|
|
"name": "CVE-2024-21887",
|
|
"full_name": "Chocapikk\/CVE-2024-21887",
|
|
"owner": {
|
|
"login": "Chocapikk",
|
|
"id": 88535377,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
|
"html_url": "https:\/\/github.com\/Chocapikk"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-21887",
|
|
"description": "A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.",
|
|
"fork": false,
|
|
"created_at": "2024-01-16T20:59:38Z",
|
|
"updated_at": "2024-03-23T04:34:06Z",
|
|
"pushed_at": "2024-01-17T00:38:28Z",
|
|
"stargazers_count": 42,
|
|
"watchers_count": 42,
|
|
"has_discussions": false,
|
|
"forks_count": 12,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 12,
|
|
"watchers": 42,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 744452699,
|
|
"name": "Check-Vulns-Script",
|
|
"full_name": "TheRedDevil1\/Check-Vulns-Script",
|
|
"owner": {
|
|
"login": "TheRedDevil1",
|
|
"id": 156904848,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156904848?v=4",
|
|
"html_url": "https:\/\/github.com\/TheRedDevil1"
|
|
},
|
|
"html_url": "https:\/\/github.com\/TheRedDevil1\/Check-Vulns-Script",
|
|
"description": "Here is a script to check vulns CVE-2023-46805 and CVE-2024-21887",
|
|
"fork": false,
|
|
"created_at": "2024-01-17T10:29:02Z",
|
|
"updated_at": "2024-03-18T04:20:06Z",
|
|
"pushed_at": "2024-01-17T10:35:15Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 4,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 745015590,
|
|
"name": "CVE-2023-46805_CVE-2024-21887",
|
|
"full_name": "raminkarimkhani1996\/CVE-2023-46805_CVE-2024-21887",
|
|
"owner": {
|
|
"login": "raminkarimkhani1996",
|
|
"id": 26582031,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26582031?v=4",
|
|
"html_url": "https:\/\/github.com\/raminkarimkhani1996"
|
|
},
|
|
"html_url": "https:\/\/github.com\/raminkarimkhani1996\/CVE-2023-46805_CVE-2024-21887",
|
|
"description": "The script in this repository only checks whether the vulnerabilities specified in the Ivanti Connect Secure product exist.",
|
|
"fork": false,
|
|
"created_at": "2024-01-18T13:25:46Z",
|
|
"updated_at": "2024-02-19T06:57:34Z",
|
|
"pushed_at": "2024-01-18T13:38:39Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 745284788,
|
|
"name": "Ivanti-Connect-Around-Scan",
|
|
"full_name": "seajaysec\/Ivanti-Connect-Around-Scan",
|
|
"owner": {
|
|
"login": "seajaysec",
|
|
"id": 7016191,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7016191?v=4",
|
|
"html_url": "https:\/\/github.com\/seajaysec"
|
|
},
|
|
"html_url": "https:\/\/github.com\/seajaysec\/Ivanti-Connect-Around-Scan",
|
|
"description": "Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.",
|
|
"fork": false,
|
|
"created_at": "2024-01-19T02:12:11Z",
|
|
"updated_at": "2024-02-21T00:17:04Z",
|
|
"pushed_at": "2024-02-03T01:59:49Z",
|
|
"stargazers_count": 11,
|
|
"watchers_count": 11,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 11,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 745384269,
|
|
"name": "CVE-2023-46805_CVE-2024-21887_scan_grouped",
|
|
"full_name": "mickdec\/CVE-2023-46805_CVE-2024-21887_scan_grouped",
|
|
"owner": {
|
|
"login": "mickdec",
|
|
"id": 33021266,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33021266?v=4",
|
|
"html_url": "https:\/\/github.com\/mickdec"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mickdec\/CVE-2023-46805_CVE-2024-21887_scan_grouped",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2024-01-19T08:11:31Z",
|
|
"updated_at": "2024-01-19T08:13:06Z",
|
|
"pushed_at": "2024-01-19T08:38:16Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 745995423,
|
|
"name": "CVE-2024-21887",
|
|
"full_name": "tucommenceapousser\/CVE-2024-21887",
|
|
"owner": {
|
|
"login": "tucommenceapousser",
|
|
"id": 129875733,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4",
|
|
"html_url": "https:\/\/github.com\/tucommenceapousser"
|
|
},
|
|
"html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2024-21887",
|
|
"description": "exploit for ivanti",
|
|
"fork": false,
|
|
"created_at": "2024-01-20T19:15:23Z",
|
|
"updated_at": "2024-01-21T12:09:30Z",
|
|
"pushed_at": "2024-01-20T19:20:25Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 755240791,
|
|
"name": "CVE-2024-21887",
|
|
"full_name": "imhunterand\/CVE-2024-21887",
|
|
"owner": {
|
|
"login": "imhunterand",
|
|
"id": 109766416,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109766416?v=4",
|
|
"html_url": "https:\/\/github.com\/imhunterand"
|
|
},
|
|
"html_url": "https:\/\/github.com\/imhunterand\/CVE-2024-21887",
|
|
"description": "Ivanti Connect Secure & Ivanti Policy Secure allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. (RCE Exploits)",
|
|
"fork": false,
|
|
"created_at": "2024-02-09T18:07:06Z",
|
|
"updated_at": "2024-02-09T18:08:57Z",
|
|
"pushed_at": "2024-02-09T18:08:04Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2024-21887",
|
|
"exploit-code",
|
|
"rce-exploit",
|
|
"remote-code-execution"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |