高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) | https://github.com/BasuCert/WinboxPoC | POC詳細 |
| 2 | C# implementation of BasuCert/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)] | https://github.com/msterusky/WinboxExploit | POC詳細 |
| 3 | Automated version of CVE-2018-14847 (MikroTik Exploit) | https://github.com/syrex1013/MikroRoot | POC詳細 |
| 4 | MikroTik RouterOS Winbox未经身份验证的任意文件读/写漏洞 | https://github.com/jas502n/CVE-2018-14847 | POC詳細 |
| 5 | Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 | https://github.com/mahmoodsabir/mikrotik-beast | POC詳細 |
| 6 | Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) | https://github.com/Tr33-He11/winboxPOC | POC詳細 |
| 7 | PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script | https://github.com/sinichi449/Python-MikrotikLoginExploit | POC詳細 |
| 8 | None | https://github.com/yukar1z0e/CVE-2018-14847 | POC詳細 |
| 9 | This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead. | https://github.com/hacker30468/Mikrotik-router-hack | POC詳細 |
| 10 | By the Way is an exploit that enables a root shell on Mikrotik devices running RouterOS versions: | https://github.com/babyshen/routeros-CVE-2018-14847-bytheway | POC詳細 |
| 11 | None | https://github.com/K3ysTr0K3R/CVE-2018-14847-EXPLOIT | POC詳細 |
| 12 | This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead. | https://github.com/tausifzaman/CVE-2018-14847 | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2018-14835 | Subrion CMS 跨站脚本漏洞 | |
| CVE-2018-14836 | Subrion 访问控制错误漏洞 | |
| CVE-2018-14838 | rejucms 跨站脚本漏洞 | |
| CVE-2018-14840 | Subrion CMS 跨站脚本漏洞 | |
| CVE-2017-9118 | PHP 缓冲区错误漏洞 | |
| CVE-2017-9120 | PHP 数字错误漏洞 | |
| CVE-2018-7649 | Monitorix 跨站脚本漏洞 | |
| CVE-2018-14851 | PHP 缓冲区错误漏洞 | |
| CVE-2018-14858 | idreamsoft iCMS 安全漏洞 | |
| CVE-2017-6213 | paypal/invoice-sdk-php 跨站脚本漏洞 | |
| CVE-2017-6215 | paypal/permissions-sdk-php 跨站脚本漏洞 |
まだコメントはありません