Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Tool for exploit CVE-2015-3306 | https://github.com/shk0x/cpx_proftpd | POC Details |
| 2 | Exploits the arbitrary file write bug in proftpd (CVE-2015-3306) attempts code execution | https://github.com/nootropics/propane | POC Details |
| 3 | ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container | https://github.com/t0kx/exploit-CVE-2015-3306 | POC Details |
| 4 | ProFTPd 1.3.5 - File Copy | https://github.com/davidtavarez/CVE-2015-3306 | POC Details |
| 5 | cve-2015-3306 | https://github.com/cved-sources/cve-2015-3306 | POC Details |
| 6 | cve-2015-3306 docker image | https://github.com/hackarada/cve-2015-3306 | POC Details |
| 7 | None | https://github.com/cdedmondson/Modified-CVE-2015-3306-Exploit | POC Details |
| 8 | Converted with tweaks from a metasploit module as an exercise for OSCP studying and exploit development | https://github.com/cd6629/CVE-2015-3306-Python-PoC | POC Details |
| 9 | None | https://github.com/0xm4ud/ProFTPD_CVE-2015-3306 | POC Details |
| 10 | An implementation of CVE-2015-3306 | https://github.com/jptr218/proftpd_bypass | POC Details |
| 11 | PoC for CVE-2015-3306 a arbitrary file write vulnerability in ProFTPd 1.3.5 | https://github.com/xchg-rax-rax/CVE-2015-3306- | POC Details |
| 12 | Script that exploits the vulnerability of the ProFTP 1.3.5 service with CVE-2015-3306 | https://github.com/JoseLRC97/ProFTPd-1.3.5-mod_copy-Remote-Command-Execution | POC Details |
| 13 | ProFTPD 1.3.5 contains a remote code execution vulnerability via the mod_copy module which allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands. | https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2015/CVE-2015-3306.yaml | POC Details |
| 14 | This contains single-file exploit for ProFTPd 1.3.5 mod_copy (CVE-2015-3306) vulnerability, especially for TryHackMe Kenobi Lab. | https://github.com/Z3R0-0x30/CVE-2015-3306 | POC Details |
| 15 | None | https://github.com/donmedfor/CVE-2015-3306 | POC Details |
| 16 | This is a customized script to help solve the lab on remote code execution under the CVE-2015-3306 lab. | https://github.com/cybersensei-EH/hackviser_labs_CVE-2015-3306 | POC Details |
| 17 | CVE-2015-3306 - ProFTPD - RCE Home Lab setup (Docker) easy to use for Red Teaming or Penetration Testing | https://github.com/netw0rk7/CVE-2015-3306-Home-Lab | POC Details |
| 18 | Exploitation report for ProFTPD 1.3.5 mod_copy (CVE-2015-3306) lab. | https://github.com/canpilayda/proftpd-mod_copy-cve-2015-3306 | POC Details |
| 19 | Tool for exploit CVE-2015-3306 | https://github.com/xyk0x/cpx_proftpd | POC Details |
| 20 | This contains single-file exploit for ProFTPd 1.3.5 mod_copy (CVE-2015-3306) vulnerability, especially for TryHackMe Kenobi Lab. | https://github.com/Z3R0space/CVE-2015-3306 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2014-8383 | InFocus IN3128HD投影仪安全漏洞 | |
| CVE-2014-8384 | InFocus IN3128HD投影仪安全漏洞 | |
| CVE-2015-0278 | libuv‘process.c’权限许可和访问控制问题漏洞 | |
| CVE-2015-1868 | PowerDNS Recursor和Authoritative Server 拒绝服务漏洞 | |
| CVE-2015-2346 | Huawei SEQ Analyst XML外部实体漏洞 | |
| CVE-2015-2667 | GNS3 不可信搜索路径漏洞 | |
| CVE-2015-2704 | realmd 代码注入漏洞 | |
| CVE-2015-3455 | Squid Certificate Validation 安全漏洞 | |
| CVE-2015-3627 | Libcontainer和Docker Engine 权限许可和访问控制漏洞 | |
| CVE-2015-3629 | Docker Libcontainer 安全绕过漏洞 | |
| CVE-2015-3630 | Docker Engine 安全绕过漏洞 | |
| CVE-2015-3631 | Docker Engine 权限许可和访问控制漏洞 |
No comments yet