PoC-in-GitHub/2024/CVE-2024-0012.json
2025-11-19 21:44:05 +09:00

317 lines
No EOL
11 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 890817341,
"name": "palo-alto-panos-cve-2024-0012",
"full_name": "watchtowrlabs\/palo-alto-panos-cve-2024-0012",
"owner": {
"login": "watchtowrlabs",
"id": 99977116,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99977116?v=4",
"html_url": "https:\/\/github.com\/watchtowrlabs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/watchtowrlabs\/palo-alto-panos-cve-2024-0012",
"description": null,
"fork": false,
"created_at": "2024-11-19T08:29:32Z",
"updated_at": "2025-08-18T09:08:00Z",
"pushed_at": "2024-11-19T09:28:42Z",
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 24,
"score": 0,
"subscribers_count": 1
},
{
"id": 890899855,
"name": "CVE-2024-0012-POC",
"full_name": "Sachinart\/CVE-2024-0012-POC",
"owner": {
"login": "Sachinart",
"id": 18497191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18497191?v=4",
"html_url": "https:\/\/github.com\/Sachinart",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Sachinart\/CVE-2024-0012-POC",
"description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC",
"fork": false,
"created_at": "2024-11-19T11:30:25Z",
"updated_at": "2025-04-28T05:05:38Z",
"pushed_at": "2024-11-19T11:37:09Z",
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 20,
"score": 0,
"subscribers_count": 1
},
{
"id": 891583314,
"name": "CVE-2024-0012",
"full_name": "greaselovely\/CVE-2024-0012",
"owner": {
"login": "greaselovely",
"id": 71092239,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71092239?v=4",
"html_url": "https:\/\/github.com\/greaselovely",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/greaselovely\/CVE-2024-0012",
"description": "PANW NGFW CVE-2024-0012",
"fork": false,
"created_at": "2024-11-20T15:35:29Z",
"updated_at": "2025-01-15T02:26:18Z",
"pushed_at": "2024-11-22T20:10:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 892487345,
"name": "CVE-2024-0012-poc",
"full_name": "iSee857\/CVE-2024-0012-poc",
"owner": {
"login": "iSee857",
"id": 73977770,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73977770?v=4",
"html_url": "https:\/\/github.com\/iSee857",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/iSee857\/CVE-2024-0012-poc",
"description": "CVE-2024-0012批量检测脚本",
"fork": false,
"created_at": "2024-11-22T07:52:11Z",
"updated_at": "2025-04-01T08:52:36Z",
"pushed_at": "2025-04-01T08:52:33Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 892650578,
"name": "cve-2024-0012-poc",
"full_name": "XiaomingX\/cve-2024-0012-poc",
"owner": {
"login": "XiaomingX",
"id": 5387930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
"html_url": "https:\/\/github.com\/XiaomingX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-0012-poc",
"description": "CVE-2024-0012是Palo Alto Networks PAN-OS软件中的一个身份验证绕过漏洞。该漏洞允许未经身份验证的攻击者通过网络访问管理Web界面获取PAN-OS管理员权限从而执行管理操作、篡改配置或利用其他需要身份验证的特权提升漏洞如CVE-2024-9474 ",
"fork": false,
"created_at": "2024-11-22T14:11:56Z",
"updated_at": "2025-11-19T10:33:36Z",
"pushed_at": "2024-11-22T14:37:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 892819901,
"name": "Paloalto-CVE-2024-0012",
"full_name": "punitdarji\/Paloalto-CVE-2024-0012",
"owner": {
"login": "punitdarji",
"id": 38101321,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38101321?v=4",
"html_url": "https:\/\/github.com\/punitdarji",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/punitdarji\/Paloalto-CVE-2024-0012",
"description": null,
"fork": false,
"created_at": "2024-11-22T20:58:17Z",
"updated_at": "2024-11-22T21:00:08Z",
"pushed_at": "2024-11-22T21:00:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 896532665,
"name": "CVE-2024-0012",
"full_name": "0xjessie21\/CVE-2024-0012",
"owner": {
"login": "0xjessie21",
"id": 2928054,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2928054?v=4",
"html_url": "https:\/\/github.com\/0xjessie21",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xjessie21\/CVE-2024-0012",
"description": "CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC",
"fork": false,
"created_at": "2024-11-30T16:06:02Z",
"updated_at": "2025-07-19T23:22:54Z",
"pushed_at": "2024-12-02T02:33:40Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2024-0012",
"exploit",
"paloaltonetworks"
],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 902007048,
"name": "CVE-2024-0012_CVE-2024-9474_PoC",
"full_name": "TalatumLabs\/CVE-2024-0012_CVE-2024-9474_PoC",
"owner": {
"login": "TalatumLabs",
"id": 191394406,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/191394406?v=4",
"html_url": "https:\/\/github.com\/TalatumLabs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TalatumLabs\/CVE-2024-0012_CVE-2024-9474_PoC",
"description": "This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution.",
"fork": false,
"created_at": "2024-12-11T18:13:32Z",
"updated_at": "2025-11-18T06:16:34Z",
"pushed_at": "2024-12-12T15:48:10Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 928555590,
"name": "cve-2024-0012-gui-poc",
"full_name": "dcollaoa\/cve-2024-0012-gui-poc",
"owner": {
"login": "dcollaoa",
"id": 20039386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20039386?v=4",
"html_url": "https:\/\/github.com\/dcollaoa",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dcollaoa\/cve-2024-0012-gui-poc",
"description": "Python script for CVE-2024-0012 \/ CVE-2024-9474 exploit",
"fork": false,
"created_at": "2025-02-06T20:30:15Z",
"updated_at": "2025-10-05T10:56:30Z",
"pushed_at": "2025-04-22T17:08:15Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 987423285,
"name": "PanOsExploitMultitool",
"full_name": "Regent8SH\/PanOsExploitMultitool",
"owner": {
"login": "Regent8SH",
"id": 92694455,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92694455?v=4",
"html_url": "https:\/\/github.com\/Regent8SH",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Regent8SH\/PanOsExploitMultitool",
"description": "Exploitation and Post-Exploitation Multitool for Palo Alto PAN-OS Systems affected by vulnerabilities CVE-2024-0012 and CVE-2024-9474",
"fork": false,
"created_at": "2025-05-21T03:59:13Z",
"updated_at": "2025-09-29T05:44:52Z",
"pushed_at": "2025-05-21T07:05:41Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}
]