PoC-in-GitHub/2024/CVE-2024-21887.json
2024-01-23 15:31:39 +09:00

272 lines
No EOL
9.7 KiB
JSON

[
{
"id": 743084274,
"name": "ivanti-CVE-2024-21887",
"full_name": "oways\/ivanti-CVE-2024-21887",
"owner": {
"login": "oways",
"id": 11142952,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11142952?v=4",
"html_url": "https:\/\/github.com\/oways"
},
"html_url": "https:\/\/github.com\/oways\/ivanti-CVE-2024-21887",
"description": "POC Checker for ivanti CVE-2024-21887 Command injcetion",
"fork": false,
"created_at": "2024-01-14T09:25:56Z",
"updated_at": "2024-01-21T01:00:54Z",
"pushed_at": "2024-01-14T09:27:36Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 744178364,
"name": "pulse-meter",
"full_name": "rxwx\/pulse-meter",
"owner": {
"login": "rxwx",
"id": 2202542,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4",
"html_url": "https:\/\/github.com\/rxwx"
},
"html_url": "https:\/\/github.com\/rxwx\/pulse-meter",
"description": "Tool for checking the Ivanti Connect Secure System Snapshot for IOCs related to CVE-2023-46805 and CVE-2024-21887",
"fork": false,
"created_at": "2024-01-16T19:19:52Z",
"updated_at": "2024-01-23T05:11:22Z",
"pushed_at": "2024-01-16T19:22:59Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 9,
"score": 0,
"subscribers_count": 2
},
{
"id": 744186376,
"name": "CVE-2023-46805_CVE-2024-21887",
"full_name": "duy-31\/CVE-2023-46805_CVE-2024-21887",
"owner": {
"login": "duy-31",
"id": 20819326,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20819326?v=4",
"html_url": "https:\/\/github.com\/duy-31"
},
"html_url": "https:\/\/github.com\/duy-31\/CVE-2023-46805_CVE-2024-21887",
"description": null,
"fork": false,
"created_at": "2024-01-16T19:40:59Z",
"updated_at": "2024-01-20T10:34:45Z",
"pushed_at": "2024-01-17T19:14:09Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 744213825,
"name": "CVE-2024-21887",
"full_name": "Chocapikk\/CVE-2024-21887",
"owner": {
"login": "Chocapikk",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Chocapikk"
},
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-21887",
"description": "A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.",
"fork": false,
"created_at": "2024-01-16T20:59:38Z",
"updated_at": "2024-01-19T14:24:09Z",
"pushed_at": "2024-01-17T00:38:28Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 744452699,
"name": "Check-Vulns-Script",
"full_name": "TheRedDevil1\/Check-Vulns-Script",
"owner": {
"login": "TheRedDevil1",
"id": 156904848,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/156904848?v=4",
"html_url": "https:\/\/github.com\/TheRedDevil1"
},
"html_url": "https:\/\/github.com\/TheRedDevil1\/Check-Vulns-Script",
"description": "Here is a script to check vulns CVE-2023-46805 and CVE-2024-21887",
"fork": false,
"created_at": "2024-01-17T10:29:02Z",
"updated_at": "2024-01-18T12:08:28Z",
"pushed_at": "2024-01-17T10:35:15Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 745015590,
"name": "CVE-2023-46805_CVE-2024-21887",
"full_name": "raminkarimkhani1996\/CVE-2023-46805_CVE-2024-21887",
"owner": {
"login": "raminkarimkhani1996",
"id": 26582031,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26582031?v=4",
"html_url": "https:\/\/github.com\/raminkarimkhani1996"
},
"html_url": "https:\/\/github.com\/raminkarimkhani1996\/CVE-2023-46805_CVE-2024-21887",
"description": "The script in this repository only checks whether the vulnerabilities specified in the Ivanti Connect Secure product exist.",
"fork": false,
"created_at": "2024-01-18T13:25:46Z",
"updated_at": "2024-01-18T13:57:46Z",
"pushed_at": "2024-01-18T13:38:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 745284788,
"name": "Ivanti-Connect-Around-Scan",
"full_name": "seajaysec\/Ivanti-Connect-Around-Scan",
"owner": {
"login": "seajaysec",
"id": 7016191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7016191?v=4",
"html_url": "https:\/\/github.com\/seajaysec"
},
"html_url": "https:\/\/github.com\/seajaysec\/Ivanti-Connect-Around-Scan",
"description": "Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.",
"fork": false,
"created_at": "2024-01-19T02:12:11Z",
"updated_at": "2024-01-21T01:02:03Z",
"pushed_at": "2024-01-20T05:06:21Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 745384269,
"name": "CVE-2023-46805_CVE-2024-21887_scan_grouped",
"full_name": "mickdec\/CVE-2023-46805_CVE-2024-21887_scan_grouped",
"owner": {
"login": "mickdec",
"id": 33021266,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33021266?v=4",
"html_url": "https:\/\/github.com\/mickdec"
},
"html_url": "https:\/\/github.com\/mickdec\/CVE-2023-46805_CVE-2024-21887_scan_grouped",
"description": null,
"fork": false,
"created_at": "2024-01-19T08:11:31Z",
"updated_at": "2024-01-19T08:13:06Z",
"pushed_at": "2024-01-19T08:38:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 745995423,
"name": "CVE-2024-21887",
"full_name": "tucommenceapousser\/CVE-2024-21887",
"owner": {
"login": "tucommenceapousser",
"id": 129875733,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4",
"html_url": "https:\/\/github.com\/tucommenceapousser"
},
"html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2024-21887",
"description": "exploit for ivanti",
"fork": false,
"created_at": "2024-01-20T19:15:23Z",
"updated_at": "2024-01-21T12:09:30Z",
"pushed_at": "2024-01-20T19:20:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]