Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510) | https://github.com/projectzeroindia/CVE-2019-11510 | POC Details |
| 2 | Pulse Secure VPN CVE-2019-11510 | https://github.com/nuc13us/Pulse | POC Details |
| 3 | Pulse Secure SSL VPN pre-auth file reading | https://github.com/imjdl/CVE-2019-11510-poc | POC Details |
| 4 | PoC for CVE-2019-11510 | Pulse Secure 8.1R15.1/8.2/8.3/9.0 SSL VPN - Arbitrary File Disclosure vulnerability | https://github.com/es0/CVE-2019-11510_poc | POC Details |
| 5 | Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510 | https://github.com/r00tpgp/http-pulse_ssl_vpn.nse | POC Details |
| 6 | SSL VPN Rce | https://github.com/jas502n/CVE-2019-11510-1 | POC Details |
| 7 | None | https://github.com/jason3e7/CVE-2019-11510 | POC Details |
| 8 | Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510) | https://github.com/BishopFox/pwn-pulse | POC Details |
| 9 | Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script. | https://github.com/aqhmal/pulsexploit | POC Details |
| 10 | This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510. | https://github.com/cisagov/check-your-pulse | POC Details |
| 11 | Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. | https://github.com/andripwn/pulse-exploit | POC Details |
| 12 | None | https://github.com/pwn3z/CVE-2019-11510-PulseVPN | POC Details |
| 13 | cve-2019-11510, cve-2019-19781, cve-2020-5902, cve-2021-1497, cve-2021-20090, cve-2021-22006, cve-2021-22205, cve-2021-26084, cve-2021-26855, cve-2021-26857, cve-2021–26857, cve-2021–26858, cve-2021–26865 | https://github.com/34zY/APT-Backpack | POC Details |
| 14 | None | https://github.com/0xab01/-CVE-2019-11510-Exploit | POC Details |
| 15 | Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4 all contain an arbitrary file reading vulnerability that could allow unauthenticated remote attackers to send a specially crafted URI to gain improper access. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-11510.yaml | POC Details |
| 16 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/pulse-cve-2019-11510.yml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet