高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | Tool for exploit CVE-2015-3306 | https://github.com/shk0x/cpx_proftpd | POC詳細 |
| 2 | Exploits the arbitrary file write bug in proftpd (CVE-2015-3306) attempts code execution | https://github.com/nootropics/propane | POC詳細 |
| 3 | ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container | https://github.com/t0kx/exploit-CVE-2015-3306 | POC詳細 |
| 4 | ProFTPd 1.3.5 - File Copy | https://github.com/davidtavarez/CVE-2015-3306 | POC詳細 |
| 5 | cve-2015-3306 | https://github.com/cved-sources/cve-2015-3306 | POC詳細 |
| 6 | cve-2015-3306 docker image | https://github.com/hackarada/cve-2015-3306 | POC詳細 |
| 7 | None | https://github.com/cdedmondson/Modified-CVE-2015-3306-Exploit | POC詳細 |
| 8 | Converted with tweaks from a metasploit module as an exercise for OSCP studying and exploit development | https://github.com/cd6629/CVE-2015-3306-Python-PoC | POC詳細 |
| 9 | None | https://github.com/0xm4ud/ProFTPD_CVE-2015-3306 | POC詳細 |
| 10 | An implementation of CVE-2015-3306 | https://github.com/jptr218/proftpd_bypass | POC詳細 |
| 11 | PoC for CVE-2015-3306 a arbitrary file write vulnerability in ProFTPd 1.3.5 | https://github.com/xchg-rax-rax/CVE-2015-3306- | POC詳細 |
| 12 | Script that exploits the vulnerability of the ProFTP 1.3.5 service with CVE-2015-3306 | https://github.com/JoseLRC97/ProFTPd-1.3.5-mod_copy-Remote-Command-Execution | POC詳細 |
| 13 | ProFTPD 1.3.5 contains a remote code execution vulnerability via the mod_copy module which allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands. | https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2015/CVE-2015-3306.yaml | POC詳細 |
| 14 | This contains single-file exploit for ProFTPd 1.3.5 mod_copy (CVE-2015-3306) vulnerability, especially for TryHackMe Kenobi Lab. | https://github.com/Z3R0-0x30/CVE-2015-3306 | POC詳細 |
| 15 | None | https://github.com/donmedfor/CVE-2015-3306 | POC詳細 |
| 16 | This is a customized script to help solve the lab on remote code execution under the CVE-2015-3306 lab. | https://github.com/cybersensei-EH/hackviser_labs_CVE-2015-3306 | POC詳細 |
| 17 | CVE-2015-3306 - ProFTPD - RCE Home Lab setup (Docker) easy to use for Red Teaming or Penetration Testing | https://github.com/netw0rk7/CVE-2015-3306-Home-Lab | POC詳細 |
| 18 | Exploitation report for ProFTPD 1.3.5 mod_copy (CVE-2015-3306) lab. | https://github.com/canpilayda/proftpd-mod_copy-cve-2015-3306 | POC詳細 |
| 19 | Tool for exploit CVE-2015-3306 | https://github.com/xyk0x/cpx_proftpd | POC詳細 |
| 20 | This contains single-file exploit for ProFTPd 1.3.5 mod_copy (CVE-2015-3306) vulnerability, especially for TryHackMe Kenobi Lab. | https://github.com/Z3R0space/CVE-2015-3306 | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2014-8383 | InFocus IN3128HD投影仪安全漏洞 | |
| CVE-2014-8384 | InFocus IN3128HD投影仪安全漏洞 | |
| CVE-2015-0278 | libuv‘process.c’权限许可和访问控制问题漏洞 | |
| CVE-2015-1868 | PowerDNS Recursor和Authoritative Server 拒绝服务漏洞 | |
| CVE-2015-2346 | Huawei SEQ Analyst XML外部实体漏洞 | |
| CVE-2015-2667 | GNS3 不可信搜索路径漏洞 | |
| CVE-2015-2704 | realmd 代码注入漏洞 | |
| CVE-2015-3455 | Squid Certificate Validation 安全漏洞 | |
| CVE-2015-3627 | Libcontainer和Docker Engine 权限许可和访问控制漏洞 | |
| CVE-2015-3629 | Docker Libcontainer 安全绕过漏洞 | |
| CVE-2015-3630 | Docker Engine 安全绕过漏洞 | |
| CVE-2015-3631 | Docker Engine 权限许可和访问控制漏洞 |
まだコメントはありません