尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | This was converted from a metasploit module as an exercise for OSCP studying | https://github.com/cd6629/CVE-2012-2982-Python-PoC | POC详情 |
| 2 | Python exploit for CVE-2012-2982 | https://github.com/OstojaOfficial/CVE-2012-2982 | POC详情 |
| 3 | PoC Python script as an exercice from tryhackme. | https://github.com/AlexJS6/CVE-2012-2982_Python | POC详情 |
| 4 | Exploit for CVE-2012-2982 | https://github.com/Ari-Weinberg/CVE-2012-2982 | POC详情 |
| 5 | A Python replicated exploit for Webmin 1.580 /file/show.cgi Remote Code Execution | https://github.com/JohnHammond/CVE-2012-2982 | POC详情 |
| 6 | None | https://github.com/R00tendo/CVE-2012-2982 | POC详情 |
| 7 | POC en Python para el CVE-2012-2982 mejorado del original por el usuario @OstojaOfficial | https://github.com/blu3ming/CVE-2012-2982 | POC详情 |
| 8 | None | https://github.com/0xF331-D3AD/CVE-2012-2982 | POC详情 |
| 9 | An exploit for CVE-2012-2982 implemented in Rust | https://github.com/0xTas/CVE-2012-2982 | POC详情 |
| 10 | Python Code For CVE-2012-2982 | https://github.com/Dawnn3619/CVE-2012-2982 | POC详情 |
| 11 | my own script in python to exploit vulnerable (It based on TryHackMe Intro PoC Scripting room) | https://github.com/LeDucKhiem/CVE-2012-2982 | POC详情 |
| 12 | Practice POC scripting in Tryhackme’s intro poc scripting room (For Linux) | https://github.com/CpyRe/CVE-2012-2982 | POC详情 |
| 13 | None | https://github.com/Shadow-Spinner/CVE-2012-2982_python | POC详情 |
| 14 | None | https://github.com/elliotosama/CVE-2012-2982 | POC详情 |
| 15 | PoC exploit for CVE-2012-2982 (Webmin RCE), for educational purposes. | https://github.com/SieGer05/CVE-2012-2982-Webmin-Exploit | POC详情 |
| 16 | None | https://github.com/SpoofIMEI/CVE-2012-2982 | POC详情 |
| 17 | Webmin 1.580 /file/show.cgi Remote Code Execution | https://github.com/lpuv/CVE-2012-2982 | POC详情 |
| 18 | PoC Python script as an exercice from tryhackme. | https://github.com/Gvmyz/CVE-2012-2982_Python | POC详情 |
| 19 | A short and sweet simple exploit script for the CVE-2012-2982 Authenticated RCE vulnerability in the /file/show.cgi/bin endpoint. | https://github.com/SincIDK/CVE-2012-2982-Exploit-Script | POC详情 |
| 20 | None | https://github.com/varppi/CVE-2012-2982 | POC详情 |
| 21 | None | https://github.com/boritopalito/CVE-2012-2982 | POC详情 |
| 22 | None | https://github.com/boriitoo/CVE-2012-2982 | POC详情 |
| 23 | Python PoC for Webmin 1.580 Remote Command Execution (CVE-2012-2982) | https://github.com/JRrooot/CVE-2012-2982-Webmin-RCE | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论