Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | This was converted from a metasploit module as an exercise for OSCP studying | https://github.com/cd6629/CVE-2012-2982-Python-PoC | POC Details |
| 2 | Python exploit for CVE-2012-2982 | https://github.com/OstojaOfficial/CVE-2012-2982 | POC Details |
| 3 | PoC Python script as an exercice from tryhackme. | https://github.com/AlexJS6/CVE-2012-2982_Python | POC Details |
| 4 | Exploit for CVE-2012-2982 | https://github.com/Ari-Weinberg/CVE-2012-2982 | POC Details |
| 5 | A Python replicated exploit for Webmin 1.580 /file/show.cgi Remote Code Execution | https://github.com/JohnHammond/CVE-2012-2982 | POC Details |
| 6 | None | https://github.com/R00tendo/CVE-2012-2982 | POC Details |
| 7 | POC en Python para el CVE-2012-2982 mejorado del original por el usuario @OstojaOfficial | https://github.com/blu3ming/CVE-2012-2982 | POC Details |
| 8 | None | https://github.com/0xF331-D3AD/CVE-2012-2982 | POC Details |
| 9 | An exploit for CVE-2012-2982 implemented in Rust | https://github.com/0xTas/CVE-2012-2982 | POC Details |
| 10 | Python Code For CVE-2012-2982 | https://github.com/Dawnn3619/CVE-2012-2982 | POC Details |
| 11 | my own script in python to exploit vulnerable (It based on TryHackMe Intro PoC Scripting room) | https://github.com/LeDucKhiem/CVE-2012-2982 | POC Details |
| 12 | Practice POC scripting in Tryhackme’s intro poc scripting room (For Linux) | https://github.com/CpyRe/CVE-2012-2982 | POC Details |
| 13 | None | https://github.com/Shadow-Spinner/CVE-2012-2982_python | POC Details |
| 14 | None | https://github.com/elliotosama/CVE-2012-2982 | POC Details |
| 15 | PoC exploit for CVE-2012-2982 (Webmin RCE), for educational purposes. | https://github.com/SieGer05/CVE-2012-2982-Webmin-Exploit | POC Details |
| 16 | None | https://github.com/SpoofIMEI/CVE-2012-2982 | POC Details |
| 17 | Webmin 1.580 /file/show.cgi Remote Code Execution | https://github.com/lpuv/CVE-2012-2982 | POC Details |
| 18 | PoC Python script as an exercice from tryhackme. | https://github.com/Gvmyz/CVE-2012-2982_Python | POC Details |
| 19 | A short and sweet simple exploit script for the CVE-2012-2982 Authenticated RCE vulnerability in the /file/show.cgi/bin endpoint. | https://github.com/SincIDK/CVE-2012-2982-Exploit-Script | POC Details |
| 20 | None | https://github.com/varppi/CVE-2012-2982 | POC Details |
| 21 | None | https://github.com/boritopalito/CVE-2012-2982 | POC Details |
| 22 | None | https://github.com/boriitoo/CVE-2012-2982 | POC Details |
| 23 | Python PoC for Webmin 1.580 Remote Command Execution (CVE-2012-2982) | https://github.com/JRrooot/CVE-2012-2982-Webmin-RCE | POC Details |
No public POC found.
Login to generate AI POCNo comments yet