92 lines
No EOL
3.6 KiB
JSON
92 lines
No EOL
3.6 KiB
JSON
[
|
|
{
|
|
"name": "fortios-auth-bypass-check-CVE-2024-55591",
|
|
"full_name": "watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591",
|
|
"html_url": "https://github.com/watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591",
|
|
"description": null,
|
|
"stargazers_count": 64,
|
|
"forks_count": 13,
|
|
"created_at": "2025-01-16T07:26:15Z"
|
|
},
|
|
{
|
|
"name": "fortios-auth-bypass-poc-CVE-2024-55591",
|
|
"full_name": "watchtowrlabs/fortios-auth-bypass-poc-CVE-2024-55591",
|
|
"html_url": "https://github.com/watchtowrlabs/fortios-auth-bypass-poc-CVE-2024-55591",
|
|
"description": null,
|
|
"stargazers_count": 48,
|
|
"forks_count": 13,
|
|
"created_at": "2025-01-27T06:25:53Z"
|
|
},
|
|
{
|
|
"name": "fortios-auth-bypass-poc-CVE-2024-55591",
|
|
"full_name": "sysirq/fortios-auth-bypass-poc-CVE-2024-55591",
|
|
"html_url": "https://github.com/sysirq/fortios-auth-bypass-poc-CVE-2024-55591",
|
|
"description": null,
|
|
"stargazers_count": 22,
|
|
"forks_count": 9,
|
|
"created_at": "2025-01-21T12:30:21Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-55591-POC",
|
|
"full_name": "exfil0/CVE-2024-55591-POC",
|
|
"html_url": "https://github.com/exfil0/CVE-2024-55591-POC",
|
|
"description": "A comprehensive all-in-one Python-based Proof of Concept script to discover and exploit a critical authentication bypass vulnerability (CVE-2024-55591) in certain Fortinet devices.",
|
|
"stargazers_count": 9,
|
|
"forks_count": 4,
|
|
"created_at": "2025-01-29T14:54:40Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-55591",
|
|
"full_name": "virus-or-not/CVE-2024-55591",
|
|
"html_url": "https://github.com/virus-or-not/CVE-2024-55591",
|
|
"description": "An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS and FortiProxy may allow a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.",
|
|
"stargazers_count": 5,
|
|
"forks_count": 1,
|
|
"created_at": "2025-01-24T20:29:56Z"
|
|
},
|
|
{
|
|
"name": "exp-cmd-add-admin-vpn-CVE-2024-55591",
|
|
"full_name": "robomusk52/exp-cmd-add-admin-vpn-CVE-2024-55591",
|
|
"html_url": "https://github.com/robomusk52/exp-cmd-add-admin-vpn-CVE-2024-55591",
|
|
"description": "CVE-2024-55591 Opening CMD (Command Line Interface), Creating a Superuser, and Managing VPN Groups",
|
|
"stargazers_count": 5,
|
|
"forks_count": 3,
|
|
"created_at": "2025-01-25T14:35:57Z"
|
|
},
|
|
{
|
|
"name": "fortios-auth-bypass-exploit-CVE-2024-55591",
|
|
"full_name": "sysirq/fortios-auth-bypass-exploit-CVE-2024-55591",
|
|
"html_url": "https://github.com/sysirq/fortios-auth-bypass-exploit-CVE-2024-55591",
|
|
"description": null,
|
|
"stargazers_count": 3,
|
|
"forks_count": 0,
|
|
"created_at": "2025-01-22T14:16:30Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-55591",
|
|
"full_name": "rawtips/CVE-2024-55591",
|
|
"html_url": "https://github.com/rawtips/CVE-2024-55591",
|
|
"description": "#PoC for CVE-2024-55591 Authentication bypass Affects: FortiOS 7.0.0 to 7.0.16 , FortiProxy 7.0.0 to 7.0.19 ,FortiProxy 7.2.0 to 7.2.12",
|
|
"stargazers_count": 1,
|
|
"forks_count": 1,
|
|
"created_at": "2025-01-29T19:39:10Z"
|
|
},
|
|
{
|
|
"name": "Private-CVE-2024-55591.",
|
|
"full_name": "amfg145/Private-CVE-2024-55591.",
|
|
"html_url": "https://github.com/amfg145/Private-CVE-2024-55591.",
|
|
"description": "Private CVE-2024-55591",
|
|
"stargazers_count": 1,
|
|
"forks_count": 0,
|
|
"created_at": "2025-01-24T12:59:37Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-55591",
|
|
"full_name": "0x7556/CVE-2024-55591",
|
|
"html_url": "https://github.com/0x7556/CVE-2024-55591",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2025-02-09T14:00:58Z"
|
|
}
|
|
] |