Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510) | https://github.com/projectzeroindia/CVE-2019-11510 | POC Details |
| 2 | Pulse Secure VPN CVE-2019-11510 | https://github.com/nuc13us/Pulse | POC Details |
| 3 | Pulse Secure SSL VPN pre-auth file reading | https://github.com/imjdl/CVE-2019-11510-poc | POC Details |
| 4 | PoC for CVE-2019-11510 | Pulse Secure 8.1R15.1/8.2/8.3/9.0 SSL VPN - Arbitrary File Disclosure vulnerability | https://github.com/es0/CVE-2019-11510_poc | POC Details |
| 5 | Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510 | https://github.com/r00tpgp/http-pulse_ssl_vpn.nse | POC Details |
| 6 | SSL VPN Rce | https://github.com/jas502n/CVE-2019-11510-1 | POC Details |
| 7 | None | https://github.com/jason3e7/CVE-2019-11510 | POC Details |
| 8 | Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510) | https://github.com/BishopFox/pwn-pulse | POC Details |
| 9 | Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script. | https://github.com/aqhmal/pulsexploit | POC Details |
| 10 | This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510. | https://github.com/cisagov/check-your-pulse | POC Details |
| 11 | Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. | https://github.com/andripwn/pulse-exploit | POC Details |
| 12 | None | https://github.com/pwn3z/CVE-2019-11510-PulseVPN | POC Details |
| 13 | cve-2019-11510, cve-2019-19781, cve-2020-5902, cve-2021-1497, cve-2021-20090, cve-2021-22006, cve-2021-22205, cve-2021-26084, cve-2021-26855, cve-2021-26857, cve-2021–26857, cve-2021–26858, cve-2021–26865 | https://github.com/34zY/APT-Backpack | POC Details |
| 14 | None | https://github.com/0xab01/-CVE-2019-11510-Exploit | POC Details |
| 15 | Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4 all contain an arbitrary file reading vulnerability that could allow unauthenticated remote attackers to send a specially crafted URI to gain improper access. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-11510.yaml | POC Details |
| 16 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/pulse-cve-2019-11510.yml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2019-11818 | Alkacon Software OpenCMS New User模块跨站脚本漏洞 | |
| CVE-2019-2046 | Android 输入验证错误漏洞 | |
| CVE-2019-2045 | Android 缓冲区错误漏洞 | |
| CVE-2019-2044 | Android 缓冲区错误漏洞 | |
| CVE-2019-2043 | Android 权限许可和访问控制问题漏洞 | |
| CVE-2019-11550 | Citrix Systems SD-WAN和Citrix Systems NetScaler SD-WAN 信任管理问题漏洞 | |
| CVE-2019-11561 | 多款Chuango产品访问控制错误漏洞 | |
| CVE-2019-11564 | Humhub 跨站脚本漏洞 | |
| CVE-2019-11819 | Alkacon Software OpenCMS New User模块注入漏洞 | |
| CVE-2019-2047 | Android 缓冲区错误漏洞 | |
| CVE-2019-11642 | OneShield Policy框架注入漏洞 | |
| CVE-2019-11643 | OneShield Policy框架跨站脚本漏洞 | |
| CVE-2019-11815 | Linux kernel 竞争条件问题漏洞 | |
| CVE-2019-8349 | HTMLy 跨站脚本漏洞 | |
| CVE-2019-8387 | Master IP CAM 01 命令注入漏洞 | |
| CVE-2019-11814 | MISP 跨站脚本漏洞 | |
| CVE-2019-11813 | MISP 跨站脚本漏洞 | |
| CVE-2019-11812 | MISP 跨站脚本漏洞 | |
| CVE-2019-11507 | Pulse Secure Pulse Connect Secure 跨站脚本漏洞 | |
| CVE-2019-9698 | Symantec AV Engine 权限许可和访问控制问题漏洞 |
Showing top 20 of 37 CVEs. View all on vendor page → →
No comments yet