Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-24919 PoC — Information disclosure

Source
Associated Vulnerability
Title:Information disclosure (CVE-2024-24919)
Description:Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
Readme
# Recon Tool

## Installation

1. git clone https://github.com/satchhacker/cve-2024-24919.git
2. cd cve-2024-24919
3. chmod +x cve-2024-24919.sh
4. ln -s $(pwd)/cve-2024-24919.sh /usr/bin/cve-2024-24919.sh

To use the tool, simply run:

cve-2024-24919

## Usage

This tool will make a curl request to the ip/domain in the domain file you provided, and it will test for CVE-2024-24919

## Disclaimer

This tool is intended for educational and research purposes only. The author is not responsible for any misuse or damage caused by this tool.

File Snapshot

[4.0K] /data/pocs/83c4b8dc21f5010ada50b785edb4d47c9fde2858 ├── [1.7K] cve-2024-24919.sh └── [ 543] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →