关联漏洞
介绍
# CVE_2024_24919 Vulnerability Scanner
This Java tool scans a list of IP addresses for the CVE-2024-24919 vulnerability. It attempts to exploit the vulnerability and provides options to print the response body data and change the target file directory.
## Table of Contents
- [Usage](#usage)
- [Features](#features)
- [Installation](#installation)
- [Running the Tool](#running-the-tool)
- [License](#license)
## Usage
The tool reads a list of IP addresses from a file named `domain-IP.txt`, checks each IP for the CVE-2024-24919 vulnerability, and provides interactive options for further actions based on the results.
### Features
- **Vulnerability Check**: Verifies if the IP address is vulnerable to CVE-2024-24919.
- **Interactive Response**: Prompts the user to print the response body data and change the file directory for more in-depth vulnerability exploitation.
## Installation
1. **Clone the Repository**:
```sh
git clone https://github.com/yourusername/CVE_2024_24919_Scanner.git
cd CVE_2024_24919_Scanner
```
2. **Ensure Java is Installed**:
Make sure you have Java installed on your system. You can download it from [here](https://www.java.com/en/download/).
3. **Prepare the IP List**:
Create a file named `domain-IP.txt` in the root directory of the project and list the IP addresses you want to check, one per line.
## Running the Tool
Compile and run the Java program with the following commands:
```sh
javac CVE_2024_24919.java
java CVE_2024_24919
文件快照
[4.0K] /data/pocs/e2fdcecee518dc3c4a78a6beebfcf59074747c23
├── [3.8K] CVE_2024_24919.java
├── [ 34K] LICENSE
└── [1.5K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。