Skip to content

mr-kasim-mehar/CVE-2024-24919-Exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

CVE_2024_24919 Vulnerability Scanner

This Java tool scans a list of IP addresses for the CVE-2024-24919 vulnerability. It attempts to exploit the vulnerability and provides options to print the response body data and change the target file directory.

Table of Contents

Usage

The tool reads a list of IP addresses from a file named domain-IP.txt, checks each IP for the CVE-2024-24919 vulnerability, and provides interactive options for further actions based on the results.

Features

  • Vulnerability Check: Verifies if the IP address is vulnerable to CVE-2024-24919.
  • Interactive Response: Prompts the user to print the response body data and change the file directory for more in-depth vulnerability exploitation.

Installation

  1. Clone the Repository:

    git clone https://github.com/yourusername/CVE_2024_24919_Scanner.git
    cd CVE_2024_24919_Scanner
  2. Ensure Java is Installed: Make sure you have Java installed on your system. You can download it from here.

  3. Prepare the IP List: Create a file named domain-IP.txt in the root directory of the project and list the IP addresses you want to check, one per line.

Running the Tool

Compile and run the Java program with the following commands:

javac CVE_2024_24919.java
java CVE_2024_24919

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages