Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | An exploit to get root in vsftpd 2.3.4 (CVE-2011-2523) written in python | https://github.com/HerculesRD/vsftpd2.3.4PyExploit | POC Details |
| 2 | vsftpd 2.3.4 Backdoor Exploit | https://github.com/nobodyatall648/CVE-2011-2523 | POC Details |
| 3 | https://www.exploit-db.com/exploits/49757 | https://github.com/Gr4ykt/CVE-2011-2523 | POC Details |
| 4 | Python exploit for vsftpd 2.3.4 - Backdoor Command Execution | https://github.com/padsalatushal/CVE-2011-2523 | POC Details |
| 5 | FreePascal implementation of the vsFTPD 2.3.4 CVE-2011-2523 | https://github.com/MFernstrom/OffensivePascal-CVE-2011-2523 | POC Details |
| 6 | Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution) | https://github.com/0xSojalSec/-CVE-2011-2523 | POC Details |
| 7 | Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution) | https://github.com/0xSojalSec/CVE-2011-2523 | POC Details |
| 8 | None | https://github.com/XiangSi-Howard/CTF---CVE-2011-2523 | POC Details |
| 9 | CVE-2011-2523 exploit | https://github.com/0xFTW/CVE-2011-2523 | POC Details |
| 10 | Python exploit for vsftpd 2.3.4 - Backdoor Command Execution | https://github.com/Lynk4/CVE-2011-2523 | POC Details |
| 11 | Python exploit for vsftpd 2.3.4 - Backdoor Command Execution | https://github.com/vaishnavucv/CVE-2011-2523 | POC Details |
| 12 | A tool that exploits the CVE-2011-2523 vulnerability. | https://github.com/chleba124/vsftpd-exploit | POC Details |
| 13 | Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution) | https://github.com/4m3rr0r/CVE-2011-2523-poc | POC Details |
| 14 | CVE-2011-2523 exploit | https://github.com/cowsecurity/CVE-2011-2523 | POC Details |
| 15 | None | https://github.com/Shubham-2k1/Exploit-CVE-2011-2523 | POC Details |
| 16 | A basic script that exploits CVE-2011-2523 | https://github.com/Tenor-Z/SmileySploit | POC Details |
| 17 | vsFTPd 2.3.4 Remote Code Execution (CVE-2011-2523) PoC | https://github.com/sug4r-wr41th/CVE-2011-2523 | POC Details |
| 18 | POC para CVE-2011-2523 | https://github.com/Fatalitysec/vsftpd_2.3.4_Backdoor | POC Details |
| 19 | A Simple Python Program that uses gets a Remote Root Shell on the Target Device by exploiting a Vulnerability (CVE-2011-2523) present in vsFTP 2.3.4 | https://github.com/Gill-Singh-A/vsFTP-2.3.4-Remote-Root-Shell-Exploit | POC Details |
| 20 | This tool exploits a well-known backdoor vulnerability found in vsFTPd version 2.3.4 (CVE-2011-2523) | https://github.com/everythingBlackkk/vsFTPd-Backdoor-Exploit-CVE-2011-2523- | POC Details |
| 21 | PoC CVE-2011-2523 | https://github.com/Uno13x/CVE-2011-2523-PoC | POC Details |
| 22 | PoC CVE-2011-2523 | https://github.com/R4idB0Y/CVE-2011-2523-PoC | POC Details |
| 23 | PoC CVE-2011-2523 | https://github.com/0xB0y426/CVE-2011-2523-PoC | POC Details |
| 24 | VsFTPd 2.3.4 Backdoor Command Execution | https://github.com/NullBrunk/CVE-2011-2523 | POC Details |
| 25 | CVE-2011-2523 vsftpd 2.3.4 exploit | https://github.com/Lychi3/vsftpd-backdoor | POC Details |
| 26 | Vulnerability assessment and exploitation of vsftpd 2.3.4 (CVE-2011-2523) using Metasploit. Full report and proof of root access included. | https://github.com/vedpakhare/vsftpd-234-vuln-report | POC Details |
| 27 | None | https://github.com/madanokr001/CVE-2011-2523 | POC Details |
| 28 | VSFTPD v2.3.4 had a serious backdoor vulnerability allowing attackers to execute arbitrary commands on the server with root-level access. The backdoor was triggered by a specific string of characters in a user login request, which allowed attackers to execute any command they wanted. | https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2011/CVE-2011-2523.yaml | POC Details |
| 29 | Laboratorio técnico de ciberseguridad donde se realiza reconocimiento de red con Nmap y explotación de la vulnerabilidad CVE-2011-2523 (vsftpd 2.3.4) mediante Metasploit Framework. Proyecto académico orientado a demostrar habilidades en análisis de vulnerabilidades, uso de herramientas de pentesting y reporte técnico. | https://github.com/JohanMV/explotacion-vsftpd-nmap_Laboratorio_1 | POC Details |
| 30 | Exploit for CVE-2011-2523. | https://github.com/lghost256/vsftpd234-exploit | POC Details |
| 31 | None | https://github.com/hklabCR/CVE-2011-2523 | POC Details |
| 32 | Python exploit for vsftpd 2.3.4 - Backdoor Command Execution | https://github.com/krill-x7/CVE-2011-2523 | POC Details |
| 33 | None | https://github.com/cybermads/CVE-2011-2523 | POC Details |
| 34 | A classic Exploit updated for vsftpd backdoor 2.3.4 | https://github.com/As9xm/BrokenDoor-CVE-2011-2523- | POC Details |
| 35 | Python exploit for vsftpd 2.3.4 - Backdoor Command Execution | https://github.com/BolivarJ/CVE-2011-2523 | POC Details |
| 36 | A step-by-step walkthrough of exploiting the vsFTPd 2.3.4 backdoor vulnerability (CVE-2011-2523) in a controlled lab environment, demonstrating reconnaissance, exploitation with Metasploit, and establishing a reverse shell. | https://github.com/seerat-fatima21/vsftpd-exploit | POC Details |
| 37 | his project demonstrates the exploitation of the vsFTPd 2.3.4 backdoor vulnerability (CVE-2011-2523) using Metasploitable 2 and Kali Linux with Metasploit. It includes reconnaissance, exploitation, and defensive measures, with a detailed report and lab setup for learning ethical hacking and security best practices. | https://github.com/hajisthabegum/Exploiting-vsFTPd-2.3.4-Backdoor-Vulnerability-Ethical-Hacking-Lab-with-Metasploitable-2-Metasploit | POC Details |
| 38 | Explotacion de la version 2.3.4 de vsftpd automatizada | https://github.com/avivyap/CVE-2011-2523 | POC Details |
| 39 | Comprehensive Penetration Testing report and exploit chain for Metasploitable 2 focusing on CVE-2011-2523. | https://github.com/KlyneZyro/Metasploitable2-VAPT-Report | POC Details |
| 40 | Full-lifecycle penetration test of a legacy Linux environment (Metasploitable 2) emulated on Apple Silicon. Demonstrating network reconnaissance, RCE via service backdoors (CVE-2011-2523), and cryptographic credential recovery. | https://github.com/Mirza-22144/Vulnerability-Assessment-Exploitation-Lab | POC Details |
| 41 | vsftpd 2.3.4 (CVE-2011-2523) a critical vulnerability that leads to Reverse Root Shell. In this repo I will do a PoC how to exploit it step by step, Manually & Automatically (Python) for educational purposes. | https://github.com/tshaq17/vsftpd-2.3.4---Backdoor-Command-Execution | POC Details |
| 42 | Metasploitable 2 üzerinde vsftpd 2.3.4 (CVE-2011-2523) zafiyetinin istismarı ve sızma sonrası adımlarını içeren laboratuvar çalışması. | https://github.com/Efehamzaa/Metasploit-Red-Pentest-Lab | POC Details |
No public POC found.
Login to generate AI POCZaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.