mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-31 10:40:54 +00:00
4.1 KiB
4.1 KiB
CVE-2024-24919
Description
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
POC
Reference
No PoCs from references.
Github
- https://github.com/0nin0hanz0/CVE-2024-24919-PoC
- https://github.com/0x3f3c/CVE-2024-24919
- https://github.com/0xans/CVE-2024-24919
- https://github.com/3UR/CVE-2024-24919
- https://github.com/B1naryo/CVE-2024-24919-POC
- https://github.com/Bytenull00/CVE-2024-24919
- https://github.com/Cappricio-Securities/CVE-2024-24919
- https://github.com/Expl0itD0g/CVE-2024-24919---Poc
- https://github.com/GlobalsecureAcademy/CVE-2024-24919
- https://github.com/GoatSecurity/CVE-2024-24919
- https://github.com/GuayoyoCyber/CVE-2024-24919
- https://github.com/J4F9S5D2Q7/CVE-2024-24919
- https://github.com/J4F9S5D2Q7/CVE-2024-24919-CHECKPOINT
- https://github.com/LucasKatashi/CVE-2024-24919
- https://github.com/MohamedWagdy7/CVE-2024-24919
- https://github.com/Ostorlab/KEV
- https://github.com/Praison001/CVE-2024-24919-Check-Point-Remote-Access-VPN
- https://github.com/RevoltSecurities/CVE-2024-24919
- https://github.com/Rug4lo/CVE-2024-24919-Exploit
- https://github.com/Threekiii/CVE
- https://github.com/Tim-Hoekstra/CVE-2024-24919
- https://github.com/Vulnpire/CVE-2024-24919
- https://github.com/YN1337/CVE-2024-24919
- https://github.com/am-eid/CVE-2024-24919
- https://github.com/bigb0x/CVE-2024-24919-Sniper
- https://github.com/birdlex/cve-2024-24919-checker
- https://github.com/c3rrberu5/CVE-2024-24919
- https://github.com/cp-ibmcloud/checkpoint-iaas-gw-ibm-vpc
- https://github.com/cp-ibmcloud/checkpoint-iaas-mgmt-ibm-vpc
- https://github.com/defronixpro/Defronix-Cybersecurity-Roadmap
- https://github.com/emanueldosreis/CVE-2024-24919
- https://github.com/enomothem/PenTestNote
- https://github.com/eoslvs/CVE-2024-24919
- https://github.com/fernandobortotti/CVE-2024-24919
- https://github.com/gurudattch/CVE-2024-24919
- https://github.com/hendprw/CVE-2024-24919
- https://github.com/ibaiw/2024Hvv
- https://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner
- https://github.com/lirantal/cve-cvss-calculator
- https://github.com/mr-kasim-mehar/CVE-2024-24919-Exploit
- https://github.com/netlas-io/netlas-dorks
- https://github.com/nexblade12/CVE-2024-24919
- https://github.com/nitish778191/fitness_app
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/nullcult/CVE-2024-24919-Exploit
- https://github.com/numencyber/Vulnerability_PoC
- https://github.com/pewc0/CVE-2024-24919
- https://github.com/protonnegativo/CVE-2024-24919
- https://github.com/r4p3c4/CVE-2024-24919-Checkpoint-Firewall-VPN-Check
- https://github.com/r4p3c4/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN
- https://github.com/satchhacker/cve-2024-24919
- https://github.com/satriarizka/CVE-2024-24919
- https://github.com/seed1337/CVE-2024-24919-POC
- https://github.com/sep2limited/CheckPoint_Query_Py
- https://github.com/shilpaverma2/NEW-CHECKPOINT-CVE
- https://github.com/smackerdodi/CVE-2024-24919-nuclei-templater
- https://github.com/starlox0/CVE-2024-24919-POC
- https://github.com/tanjiti/sec_profile
- https://github.com/un9nplayer/CVE-2024-24919
- https://github.com/verylazytech/CVE-2024-24919
- https://github.com/wjlin0/poc-doc
- https://github.com/wy876/POC
- https://github.com/wy876/wiki
- https://github.com/zam89/CVE-2024-24919