Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Citrix | Citrix ADC and Citrix Gateway | 13.1 ~ 13.1-45.61 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2023-24488 PoC | https://github.com/SirBugs/CVE-2023-24488-PoC | POC Details |
| 2 | CVE-2023-24488.rb The provided script is a Ruby script used to check and detect the CVE-2023-24488 security vulnerability in Citrix Gateway and Citrix ADC. | https://github.com/Abo5/CVE-2023-24488 | POC Details |
| 3 | POC for CVE-2023-24488 | https://github.com/securitycipher/CVE-2023-24488 | POC Details |
| 4 | Detect CVE-2023-24488 Exploitation Attempts | https://github.com/NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule | POC Details |
| 5 | Tools to perform exploit CVE-2023-24488 | https://github.com/lazysec0x21/CVE-2023-24488 | POC Details |
| 6 | Tools to perform exploit CVE-2023-24488 | https://github.com/raytheon0x21/CVE-2023-24488 | POC Details |
| 7 | Citrix ADC and Citrix Gateway versions before 13.1 and 13.1-45.61, 13.0 and 13.0-90.11, 12.1 and 12.1-65.35 contain a cross-site scripting vulnerability due to improper input validation. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-24488.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet