Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | PoC for Exim CVE-2023-42115 | https://github.com/cammclain/CVE-2023-42115 | POC Details |
| 2 | This module exploits a vulnerability in the target service identified as CVE-2023-42115. It sends a crafted payload to the vulnerable service to achieve a specific action. | https://github.com/isotaka134/cve-2023-42115 | POC Details |
| 3 | This module exploits a vulnerability in the target service identified as CVE-2023-42115. | https://github.com/kirinse/cve-2023-42115 | POC Details |
| 4 | A CVE-2023-42115 POC | https://github.com/AdaHop-Cyber-Security/Pocy | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-42114 | Exim NTLM Challenge Out-Of-Bounds Read Information Disclosure Vulnerability | |
| CVE-2023-42119 | Exim dnsdb Out-Of-Bounds Read Information Disclosure Vulnerability | |
| CVE-2023-42118 | Exim libspf2 Integer Underflow Remote Code Execution Vulnerability | |
| CVE-2023-42116 | Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability | |
| CVE-2023-42117 | Exim Improper Neutralization of Special Elements Remote Code Execution Vulnerability |
No comments yet