尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Python Software Foundation | CPython | 0 ~ 3.10.18 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | CVE‑2025‑4517 Proof‑of‑Concept Script | https://github.com/AnimePrincess420/CVE-2025-4517-PoC | POC详情 |
| 2 | CVE-2025-4517 (CVSS 9.4 – Critical) A vulnerability in Python's `tarfile` | https://github.com/StealthByte0/CVE-2025-4517-poc | POC详情 |
| 3 | Python tarfile data filter bypass via PATH_MAX overflow in os.path.realpath() - CVE-2025-4517 / CVE-2025-4330 | https://github.com/0xDTC/CVE-2025-4517-tarfile-PATH_MAX-bypass | POC详情 |
| 4 | Privilege Escalation script for Wingdata | https://github.com/AzureADTrent/CVE-2025-4517-POC-HTB-WingData | POC详情 |
| 5 | A high-performance Python toolkit to automate the CVE-2025-4517 PATH_MAX bypass exploit. Specifically tuned for the WingData HTB challenge to achieve arbitrary file writes and root persistence | https://github.com/Rohitberiwala/PyPath-Escape-CVE-2025-4517-Exploit-Research | POC详情 |
| 6 | PoC and explanation for CVE-2025-4517 used in a CTF I was playing. | https://github.com/kerburenthusiasm/CVE-2025-4517-PoC | POC详情 |
| 7 | None | https://github.com/ben-slates/CVE-2025-4517-POC-HTB-WINGDATA | POC详情 |
| 8 | Path traversal vulnerability in Python's tarfile. | https://github.com/estebanzarate/CVE-2025-4517-Python-tarfile-filter-data-Bypass-PoC | POC详情 |
| 9 | None | https://github.com/ben-slates/CVE-2025-4517-POC | POC详情 |
未找到公开 POC。
登录以生成 AI POC| CVE-2025-4138 | 7.5 HIGH | Python 安全漏洞 |
| CVE-2025-4330 | 7.5 HIGH | Python 安全漏洞 |
| CVE-2025-4435 | 7.5 HIGH | CPython 安全漏洞 |
| CVE-2024-12718 | 5.3 MEDIUM | Python 安全漏洞 |
暂无评论