PoC-in-GitHub/2024/CVE-2024-0012.json
2024-12-15 03:32:08 +09:00

286 lines
No EOL
10 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 890817341,
"name": "palo-alto-panos-cve-2024-0012",
"full_name": "watchtowrlabs\/palo-alto-panos-cve-2024-0012",
"owner": {
"login": "watchtowrlabs",
"id": 99977116,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99977116?v=4",
"html_url": "https:\/\/github.com\/watchtowrlabs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/watchtowrlabs\/palo-alto-panos-cve-2024-0012",
"description": null,
"fork": false,
"created_at": "2024-11-19T08:29:32Z",
"updated_at": "2024-12-11T04:43:45Z",
"pushed_at": "2024-11-19T09:28:42Z",
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 24,
"score": 0,
"subscribers_count": 1
},
{
"id": 890899855,
"name": "CVE-2024-0012-POC",
"full_name": "Sachinart\/CVE-2024-0012-POC",
"owner": {
"login": "Sachinart",
"id": 18497191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18497191?v=4",
"html_url": "https:\/\/github.com\/Sachinart",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Sachinart\/CVE-2024-0012-POC",
"description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC",
"fork": false,
"created_at": "2024-11-19T11:30:25Z",
"updated_at": "2024-12-05T00:53:26Z",
"pushed_at": "2024-11-19T11:37:09Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},
{
"id": 891583314,
"name": "CVE-2024-0012",
"full_name": "greaselovely\/CVE-2024-0012",
"owner": {
"login": "greaselovely",
"id": 71092239,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71092239?v=4",
"html_url": "https:\/\/github.com\/greaselovely",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/greaselovely\/CVE-2024-0012",
"description": "PANW NGFW CVE-2024-0012",
"fork": false,
"created_at": "2024-11-20T15:35:29Z",
"updated_at": "2024-11-22T20:10:24Z",
"pushed_at": "2024-11-22T20:10:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 891832016,
"name": "CVE-2024-0012",
"full_name": "VegetableLasagne\/CVE-2024-0012",
"owner": {
"login": "VegetableLasagne",
"id": 118773543,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118773543?v=4",
"html_url": "https:\/\/github.com\/VegetableLasagne",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/VegetableLasagne\/CVE-2024-0012",
"description": "Palo Alto CVE-2024-0012 Exploit POC",
"fork": false,
"created_at": "2024-11-21T03:08:00Z",
"updated_at": "2024-11-21T03:08:47Z",
"pushed_at": "2024-11-21T03:08:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 892487345,
"name": "CVE-2024-0012-poc",
"full_name": "iSee857\/CVE-2024-0012-poc",
"owner": {
"login": "iSee857",
"id": 73977770,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73977770?v=4",
"html_url": "https:\/\/github.com\/iSee857",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/iSee857\/CVE-2024-0012-poc",
"description": "CVE-2024-0012批量检测脚本",
"fork": false,
"created_at": "2024-11-22T07:52:11Z",
"updated_at": "2024-11-26T07:38:23Z",
"pushed_at": "2024-11-26T07:38:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 892650578,
"name": "cve-2024-0012-poc",
"full_name": "XiaomingX\/cve-2024-0012-poc",
"owner": {
"login": "XiaomingX",
"id": 5387930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-0012-poc",
"description": "CVE-2024-0012是Palo Alto Networks PAN-OS软件中的一个身份验证绕过漏洞。该漏洞允许未经身份验证的攻击者通过网络访问管理Web界面获取PAN-OS管理员权限从而执行管理操作、篡改配置或利用其他需要身份验证的特权提升漏洞如CVE-2024-9474 ",
"fork": false,
"created_at": "2024-11-22T14:11:56Z",
"updated_at": "2024-12-08T18:37:20Z",
"pushed_at": "2024-11-22T14:37:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 892819901,
"name": "Paloalto-CVE-2024-0012",
"full_name": "punitdarji\/Paloalto-CVE-2024-0012",
"owner": {
"login": "punitdarji",
"id": 38101321,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38101321?v=4",
"html_url": "https:\/\/github.com\/punitdarji",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/punitdarji\/Paloalto-CVE-2024-0012",
"description": null,
"fork": false,
"created_at": "2024-11-22T20:58:17Z",
"updated_at": "2024-11-22T21:00:08Z",
"pushed_at": "2024-11-22T21:00:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 896532665,
"name": "CVE-2024-0012",
"full_name": "0xjessie21\/CVE-2024-0012",
"owner": {
"login": "0xjessie21",
"id": 2928054,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2928054?v=4",
"html_url": "https:\/\/github.com\/0xjessie21",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xjessie21\/CVE-2024-0012",
"description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC",
"fork": false,
"created_at": "2024-11-30T16:06:02Z",
"updated_at": "2024-12-02T02:33:44Z",
"pushed_at": "2024-12-02T02:33:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2024-0012",
"exploit",
"paloaltonetworks"
],
"visibility": "public",
"forks": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 902007048,
"name": "CVE-2024-0012_CVE-2024-9474_PoC",
"full_name": "TalatumLabs\/CVE-2024-0012_CVE-2024-9474_PoC",
"owner": {
"login": "TalatumLabs",
"id": 191394406,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/191394406?v=4",
"html_url": "https:\/\/github.com\/TalatumLabs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TalatumLabs\/CVE-2024-0012_CVE-2024-9474_PoC",
"description": "This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution.",
"fork": false,
"created_at": "2024-12-11T18:13:32Z",
"updated_at": "2024-12-14T02:34:33Z",
"pushed_at": "2024-12-12T15:48:10Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}
]