PoC-in-GitHub/2024/CVE-2024-21762.json
2025-11-23 09:42:19 +09:00

250 lines
No EOL
9.1 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 764866619,
"name": "cve-2024-21762-check",
"full_name": "BishopFox\/cve-2024-21762-check",
"owner": {
"login": "BishopFox",
"id": 4523757,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4523757?v=4",
"html_url": "https:\/\/github.com\/BishopFox",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BishopFox\/cve-2024-21762-check",
"description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
"fork": false,
"created_at": "2024-02-28T21:16:10Z",
"updated_at": "2025-11-08T02:45:25Z",
"pushed_at": "2024-07-05T09:37:05Z",
"stargazers_count": 106,
"watchers_count": 106,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 106,
"score": 0,
"subscribers_count": 5
},
{
"id": 771422074,
"name": "CVE-2024-21762",
"full_name": "h4x0r-dz\/CVE-2024-21762",
"owner": {
"login": "h4x0r-dz",
"id": 26070859,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26070859?v=4",
"html_url": "https:\/\/github.com\/h4x0r-dz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/h4x0r-dz\/CVE-2024-21762",
"description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ",
"fork": false,
"created_at": "2024-03-13T09:17:28Z",
"updated_at": "2025-11-22T19:34:50Z",
"pushed_at": "2024-03-16T00:35:12Z",
"stargazers_count": 143,
"watchers_count": 143,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 143,
"score": 0,
"subscribers_count": 3
},
{
"id": 771765194,
"name": "CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check",
"full_name": "r4p3c4\/CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check",
"owner": {
"login": "r4p3c4",
"id": 111358086,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111358086?v=4",
"html_url": "https:\/\/github.com\/r4p3c4",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/r4p3c4\/CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check",
"description": "Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)",
"fork": false,
"created_at": "2024-03-13T22:57:00Z",
"updated_at": "2025-11-16T10:59:57Z",
"pushed_at": "2025-06-29T17:05:59Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},
{
"id": 773292574,
"name": "CVE-2024-21762",
"full_name": "d0rb\/CVE-2024-21762",
"owner": {
"login": "d0rb",
"id": 10403781,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4",
"html_url": "https:\/\/github.com\/d0rb",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/d0rb\/CVE-2024-21762",
"description": "The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.",
"fork": false,
"created_at": "2024-03-17T09:15:22Z",
"updated_at": "2025-04-23T14:24:28Z",
"pushed_at": "2024-03-17T09:20:35Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},
{
"id": 817578503,
"name": "cve-2024-21762-checker",
"full_name": "rdoix\/cve-2024-21762-checker",
"owner": {
"login": "rdoix",
"id": 59075479,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59075479?v=4",
"html_url": "https:\/\/github.com\/rdoix",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/rdoix\/cve-2024-21762-checker",
"description": null,
"fork": false,
"created_at": "2024-06-20T02:58:02Z",
"updated_at": "2024-06-20T10:27:38Z",
"pushed_at": "2024-06-20T03:41:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 877697658,
"name": "CVE-2024-21762-Checker",
"full_name": "deFr0ggy\/CVE-2024-21762-Checker",
"owner": {
"login": "deFr0ggy",
"id": 16836050,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16836050?v=4",
"html_url": "https:\/\/github.com\/deFr0ggy",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/deFr0ggy\/CVE-2024-21762-Checker",
"description": "This script performs vulnerability scanning for CVE-2024-21762, a Fortinet SSL VPN remote code execution vulnerability. It checks whether a given server is vulnerable to this CVE by sending specific requests and analyzing the responses.",
"fork": false,
"created_at": "2024-10-24T04:58:28Z",
"updated_at": "2024-10-24T04:58:28Z",
"pushed_at": "2024-03-25T11:28:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 893344306,
"name": "cve-2024-21762-poc",
"full_name": "XiaomingX\/cve-2024-21762-poc",
"owner": {
"login": "XiaomingX",
"id": 5387930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-21762-poc",
"description": "CVE-2024-21762 是 Fortinet 公司的 FortiOS 和 FortiProxy 产品中的一个严重漏洞,存在于其 SSL VPN 组件中。",
"fork": false,
"created_at": "2024-11-24T07:20:45Z",
"updated_at": "2025-11-19T10:33:38Z",
"pushed_at": "2024-11-24T08:07:19Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},
{
"id": 988496476,
"name": "CVE-2024-21762_FortiNet_PoC",
"full_name": "abrewer251\/CVE-2024-21762_FortiNet_PoC",
"owner": {
"login": "abrewer251",
"id": 150287770,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150287770?v=4",
"html_url": "https:\/\/github.com\/abrewer251",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/abrewer251\/CVE-2024-21762_FortiNet_PoC",
"description": "Proof-of-concept scanner targeting CVE-2024-21762 in FortiOS SSL VPNs \/remote\/hostcheck_validate endpoint with reverse shell payload delivery.",
"fork": false,
"created_at": "2025-05-22T16:22:37Z",
"updated_at": "2025-05-22T16:30:03Z",
"pushed_at": "2025-05-22T16:30:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]