110 lines
No EOL
3.8 KiB
JSON
110 lines
No EOL
3.8 KiB
JSON
[
|
|
{
|
|
"name": "CVE-2023-4966",
|
|
"full_name": "Chocapikk/CVE-2023-4966",
|
|
"html_url": "https://github.com/Chocapikk/CVE-2023-4966",
|
|
"description": "Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. ",
|
|
"stargazers_count": 74,
|
|
"forks_count": 12,
|
|
"created_at": "2023-10-24T17:19:32Z"
|
|
},
|
|
{
|
|
"name": "citrix_cve-2023-4966",
|
|
"full_name": "dinosn/citrix_cve-2023-4966",
|
|
"html_url": "https://github.com/dinosn/citrix_cve-2023-4966",
|
|
"description": "Citrix CVE-2023-4966 from assetnote modified for parallel and file handling",
|
|
"stargazers_count": 10,
|
|
"forks_count": 0,
|
|
"created_at": "2023-10-25T04:15:17Z"
|
|
},
|
|
{
|
|
"name": "CVE-2023-4966",
|
|
"full_name": "RevoltSecurities/CVE-2023-4966",
|
|
"html_url": "https://github.com/RevoltSecurities/CVE-2023-4966",
|
|
"description": "An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability",
|
|
"stargazers_count": 9,
|
|
"forks_count": 0,
|
|
"created_at": "2023-10-29T15:31:37Z"
|
|
},
|
|
{
|
|
"name": "CVE-2023-4966-POC",
|
|
"full_name": "mlynchcogent/CVE-2023-4966-POC",
|
|
"html_url": "https://github.com/mlynchcogent/CVE-2023-4966-POC",
|
|
"description": "Proof Of Concept for te NetScaler Vuln",
|
|
"stargazers_count": 6,
|
|
"forks_count": 2,
|
|
"created_at": "2023-10-25T12:37:56Z"
|
|
},
|
|
{
|
|
"name": "CVE-2023-4966",
|
|
"full_name": "IceBreakerCode/CVE-2023-4966",
|
|
"html_url": "https://github.com/IceBreakerCode/CVE-2023-4966",
|
|
"description": null,
|
|
"stargazers_count": 1,
|
|
"forks_count": 0,
|
|
"created_at": "2023-10-25T21:34:43Z"
|
|
},
|
|
{
|
|
"name": "CVE-2023-4966",
|
|
"full_name": "s-bt/CVE-2023-4966",
|
|
"html_url": "https://github.com/s-bt/CVE-2023-4966",
|
|
"description": "Scripts to get infos",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2023-11-20T17:32:16Z"
|
|
},
|
|
{
|
|
"name": "CVE-2023-4966",
|
|
"full_name": "LucasOneZ/CVE-2023-4966",
|
|
"html_url": "https://github.com/LucasOneZ/CVE-2023-4966",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-09-09T07:26:24Z"
|
|
},
|
|
{
|
|
"name": "CVE-2023-4966",
|
|
"full_name": "0xKayala/CVE-2023-4966",
|
|
"html_url": "https://github.com/0xKayala/CVE-2023-4966",
|
|
"description": "CVE-2023-4966 - NetScaler ADC and NetScaler Gateway Memory Leak Exploit",
|
|
"stargazers_count": 0,
|
|
"forks_count": 1,
|
|
"created_at": "2023-10-27T11:00:09Z"
|
|
},
|
|
{
|
|
"name": "CVE-2023-4966",
|
|
"full_name": "byte4RR4Y/CVE-2023-4966",
|
|
"html_url": "https://github.com/byte4RR4Y/CVE-2023-4966",
|
|
"description": "Programm to exploit a range of ip adresses",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2023-11-27T09:51:30Z"
|
|
},
|
|
{
|
|
"name": "cve-2023-4966-iocs",
|
|
"full_name": "jmussmann/cve-2023-4966-iocs",
|
|
"html_url": "https://github.com/jmussmann/cve-2023-4966-iocs",
|
|
"description": "Python script to search Citrix NetScaler logs for possible CVE-2023-4966 exploitation.",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2023-12-08T10:28:15Z"
|
|
},
|
|
{
|
|
"name": "CVE-2023-4966-exploit",
|
|
"full_name": "akshthejo/CVE-2023-4966-exploit",
|
|
"html_url": "https://github.com/akshthejo/CVE-2023-4966-exploit",
|
|
"description": "CVE-2023-4966-exploit",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-12-18T09:09:20Z"
|
|
},
|
|
{
|
|
"name": "Netscaler-CVE-2023-4966-POC",
|
|
"full_name": "senpaisamp/Netscaler-CVE-2023-4966-POC",
|
|
"html_url": "https://github.com/senpaisamp/Netscaler-CVE-2023-4966-POC",
|
|
"description": "Proof Of Concept for te NetScaler Vuln",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2023-10-25T07:17:54Z"
|
|
}
|
|
] |