Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| checkpoint | Check Point Quantum Gateway, Spark Gateway and CloudGuard Network | Check Point Quantum Gateway and CloudGuard Network versions R81.20, R81.10, R81, R80.40 and Check Point Spark versions R81.10, R80.20. | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Nuclei Template to discover CVE-2024-24919. A path traversal vulnerability in CheckPoint SSLVPN. | https://github.com/c3rrberu5/CVE-2024-24919 | POC Details |
| 2 | POC exploit for CVE-2024-24919 information leakage | https://github.com/emanueldosreis/CVE-2024-24919 | POC Details |
| 3 | None | https://github.com/hendprw/CVE-2024-24919 | POC Details |
| 4 | CVE-2024-24919 Exploit PoC | https://github.com/LucasKatashi/CVE-2024-24919 | POC Details |
| 5 | None | https://github.com/eoslvs/CVE-2024-24919 | POC Details |
| 6 | Quick and simple script that takes as input a file with multiple URLs to check for the CVE-2024-24919 vulnerability in CHECKPOINT | https://github.com/Bytenull00/CVE-2024-24919 | POC Details |
| 7 | None | https://github.com/am-eid/CVE-2024-24919 | POC Details |
| 8 | None | https://github.com/pewc0/CVE-2024-24919 | POC Details |
| 9 | Simple POC Python script that check & leverage Check Point CVE-2024-24919 vulnerability (Wrong Check Point) | https://github.com/zam89/CVE-2024-24919 | POC Details |
| 10 | A simple bash and python script to check for the vulnerability CVE-2024-24919 | https://github.com/satriarizka/CVE-2024-24919 | POC Details |
| 11 | CLI based PoC for CVE-2024-24919 | https://github.com/3UR/CVE-2024-24919 | POC Details |
| 12 | An Vulnerability detection and Exploitation tool for CVE-2024-24919 | https://github.com/RevoltSecurities/CVE-2024-24919 | POC Details |
| 13 | None | https://github.com/Vulnpire/CVE-2024-24919 | POC Details |
| 14 | None | https://github.com/seed1337/CVE-2024-24919-POC | POC Details |
| 15 | None | https://github.com/0x3f3c/CVE-2024-24919 | POC Details |
| 16 | None | https://github.com/Praison001/CVE-2024-24919-Check-Point-Remote-Access-VPN | POC Details |
| 17 | Nuclei template for CVE-2024-24919 | https://github.com/smackerdodi/CVE-2024-24919-nuclei-templater | POC Details |
| 18 | CVE-2024-24919 exploit | https://github.com/GoatSecurity/CVE-2024-24919 | POC Details |
| 19 | Exploit tool to validate CVE-2024-24919 vulnerability on Checkpoint Firewall VPNs | https://github.com/GlobalsecureAcademy/CVE-2024-24919 | POC Details |
| 20 | None | https://github.com/nexblade12/CVE-2024-24919 | POC Details |
| 21 | This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerability allows for reading system files. CVE ID: CVE-2024-24919 | https://github.com/un9nplayer/CVE-2024-24919 | POC Details |
| 22 | None | https://github.com/MohamedWagdy7/CVE-2024-24919 | POC Details |
| 23 | Check Point Security Gateway (LFI) | https://github.com/Cappricio-Securities/CVE-2024-24919 | POC Details |
| 24 | None | https://github.com/fernandobortotti/CVE-2024-24919 | POC Details |
| 25 | None | https://github.com/nicolvsrlr27/CVE-2024-24919 | POC Details |
| 26 | None | https://github.com/gurudattch/CVE-2024-24919 | POC Details |
| 27 | Mass scanner for CVE-2024-24919 | https://github.com/YN1337/CVE-2024-24919 | POC Details |
| 28 | CVE-2024-24919 [Check Point Security Gateway Information Disclosure] | https://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner | POC Details |
| 29 | Esta herramienta se utiliza para validar la vulnerabilidad CVE-2024-24919 en las VPN de Checkpoint Firewall | https://github.com/r4p3c4/CVE-2024-24919-Checkpoint-Firewall-VPN-Check | POC Details |
| 30 | Herramienta de explotación para explotar la vulnerabilidad CVE-2024-24919 en las VPN de Checkpoint Firewall | https://github.com/r4p3c4/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN | POC Details |
| 31 | None | https://github.com/J4F9S5D2Q7/CVE-2024-24919 | POC Details |
| 32 | None | https://github.com/mr-kasim-mehar/CVE-2024-24919-Exploit | POC Details |
| 33 | None | https://github.com/B1naryo/CVE-2024-24919-POC | POC Details |
| 34 | a Proof of Concept of CVE-2024-24919 | https://github.com/Expl0itD0g/CVE-2024-24919---Poc | POC Details |
| 35 | CVE-2024-24919 Sniper - A powerful tool for scanning Check Point Security Gateway CVE-2024-24919 vulnerability. Supports single & bulk scanning, multithreading, and generates detailed CSV reports. Ideal for penetration testers and security researchers. | https://github.com/bigb0x/CVE-2024-24919-Sniper | POC Details |
| 36 | None | https://github.com/birdlex/cve-2024-24919-checker | POC Details |
| 37 | CVE-2024-24919 Exploit and PoC - Critical LFI for Remote Access VPN or Mobile Access. | https://github.com/Rug4lo/CVE-2024-24919-Exploit | POC Details |
| 38 | None | https://github.com/0nin0hanz0/CVE-2024-24919-PoC | POC Details |
| 39 | Nmap script to check vulnerability CVE-2024-24919 | https://github.com/GuayoyoCyber/CVE-2024-24919 | POC Details |
| 40 | None | https://github.com/0xans/CVE-2024-24919 | POC Details |
| 41 | None | https://github.com/Tim-Hoekstra/CVE-2024-24919 | POC Details |
| 42 | A Simple Exploit Code(POC) to Automate CVE-2024–24919 | https://github.com/starlox0/CVE-2024-24919-POC | POC Details |
| 43 | CVE-2024-24919 exploit that checks more files for better visibility | https://github.com/nullcult/CVE-2024-24919-Exploit | POC Details |
| 44 | None | https://github.com/satchhacker/cve-2024-24919 | POC Details |
| 45 | None | https://github.com/P3wc0/CVE-2024-24919 | POC Details |
| 46 | None | https://github.com/J4F9S5D2Q7/CVE-2024-24919-CHECKPOINT | POC Details |
| 47 | POC - CVE-2024–24919 - Check Point Security Gateways | https://github.com/verylazytech/CVE-2024-24919 | POC Details |
| 48 | Python script to automate the process of finding vulnerable sites for CVE-2024-24919. | https://github.com/protonnegativo/CVE-2024-24919 | POC Details |
| 49 | None | https://github.com/SalehLardhi/CVE-2024-24919 | POC Details |
| 50 | None | https://github.com/ShadowByte1/CVE-2024-24919 | POC Details |
| 51 | Hello everyone, I am sharing a modified script from CVE-2024-24919 which can extract paths categorized as critical. | https://github.com/H3KEY/CVE-2024-24919 | POC Details |
| 52 | None | https://github.com/Jutrm/cve-2024-24919 | POC Details |
| 53 | None | https://github.com/smkxt1/CVE-2024-24919 | POC Details |
| 54 | None | https://github.com/yagyuufellinluvv/CVE-2024-24919 | POC Details |
| 55 | None | https://github.com/LuisMateo1/Arbitrary-File-Read-CVE-2024-24919 | POC Details |
| 56 | 🔍 Just wrapped up an incident report on a Phishing Alert (Event ID 257, SOC282). Enhancing my expertise in email threat detection and response! 🚨 #Cybersecurity #SOCAnalyst #LetsDefend | https://github.com/AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919- | POC Details |
| 57 | None | https://github.com/0xYumeko/CVE-2024-24919 | POC Details |
| 58 | PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses | https://github.com/geniuszlyy/CVE-2024-24919 | POC Details |
| 59 | None | https://github.com/skyrowalker/CVE-2024-24919 | POC Details |
| 60 | None | https://github.com/0xkalawy/CVE-2024-24919 | POC Details |
| 61 | It's Proof of Concept on CVE-2024-24919-POC , i made it after it's discoverd | https://github.com/sar-3mar/CVE-2024-24919_POC | POC Details |
| 62 | Check-Point安全网关任意文件读取漏洞(CVE-2024-24919) | https://github.com/NingXin2002/Check-Point_poc | POC Details |
| 63 | PoC script for CVE-2024-24919 vulnerability. It scans a list of target URLs to identify security issues by sending HTTP POST requests and analyzing server responses | https://github.com/geniuszly/CVE-2024-24919 | POC Details |
| 64 | CVE-2024-24919 exploit that checks more files for better visibility | https://github.com/ronniensale/CVE-2024-24919-Exploit | POC Details |
| 65 | SOC287 - Arbitrary File Read on Checkpoint Security Gateway [CVE-2024-24919] | https://github.com/drake044/SOC_287 | POC Details |
| 66 | SOC287 - Arbitrary File Read on Checkpoint Security Gateway [CVE-2024-24919] | https://github.com/hashdr1ft/SOC_287 | POC Details |
| 67 | None | https://github.com/funixone/CVE-2024-24919---Exploit-Script | POC Details |
| 68 | None | https://github.com/spider00009/CVE-2024-24919-POC | POC Details |
| 69 | None | https://github.com/0xlf/CVE-2024-24919 | POC Details |
| 70 | None | https://github.com/ejaboz/cve-2024-24919 | POC Details |
| 71 | Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-24919.yaml | POC Details |
| 72 | None | https://github.com/zxcod3/CVE-2024-24919 | POC Details |
| 73 | None | https://github.com/CyprianAtsyor/CVE-2024-24919-Incident-Report.md | POC Details |
| 74 | None | https://github.com/CyberBibs/Event-ID-263-Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919- | POC Details |
| 75 | None | https://github.com/MacUchegit/Detecting-and-Analyzing-CVE-2024-24919-Exploitation | POC Details |
| 76 | None | https://github.com/SpiX-7/CVE-2024-24919-POC | POC Details |
| 77 | None | https://github.com/0zerobyte/CVE-2024-24919 | POC Details |
| 78 | None | https://github.com/voidbroker/CVE-2024-24919 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet