关联漏洞
介绍
# CVE-2019-19781
To use this scanner goto https://cve-2019-19781.azurewebsites.net
## Features
- Scan for IPs/Hostnames that are exposted to CVE 2019 19781
- Scan offline database for leaked wildcard certificates
## Credits
This project is based on this project:
Citrixmash v0.1 - Exploits the Citrix Directory Traversal Bug: CVE-2019-19781
Tool Written by: Rob Simon and Dave Kennedy
Contributions: The TrustedSec Team
Website: https://www.trustedsec.com
文件快照
[4.0K] /data/pocs/f80b54b597d004f0ffd0f78765d85509314f6da5
├── [ 135] custom-entrypoint.sh
├── [ 415] Dockerfile
├── [1.7K] LICENSE.txt
├── [4.0K] php
│ ├── [979K] database.json
│ ├── [2.9K] index.php
│ ├── [2.9K] scan.php
│ ├── [ 998] stat.php
│ └── [2.4K] wildcard.php
├── [4.0K] python
│ ├── [ 10K] citrixmash.py
│ └── [5.9K] cve-2019-19781_scanner.py
├── [ 467] README.md
└── [ 31] requirements.txt
2 directories, 12 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。