Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | HttpFileServer httpd 2.3 | https://github.com/roughiz/cve-2014-6287.py | POC Details |
| 2 | None | https://github.com/Nicoslo/Windows-exploitation-Rejetto-HTTP-File-Server-HFS-2.3.x-CVE-2014-6287 | POC Details |
| 3 | A write up on the Steel Mountain box from TryHackMe.com and exploit for CVE-2014-6287 | https://github.com/wizardy0ga/THM-Steel_Mountain-CVE-2014-6287 | POC Details |
| 4 | a python3 version of the exploit written for CVE-2014-6287. Useful for completing the "Steel Mountain" room on TryHackMe.com without the use of metasploit. | https://github.com/mrintern/thm_steelmountain_CVE-2014-6287 | POC Details |
| 5 | CVE-2014-6287 Rejetto HFS 2.3 | https://github.com/hadrian3689/rejetto_hfs_rce | POC Details |
| 6 | CVE-2014-6287 | https://github.com/randallbanner/Rejetto-HTTP-File-Server-HFS-2.3.x---Remote-Command-Execution | POC Details |
| 7 | Rejetto http File Server 2.3.x (Reverse shell) | https://github.com/0xTabun/CVE-2014-6287 | POC Details |
| 8 | Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c | https://github.com/zhsh9/CVE-2014-6287 | POC Details |
| 9 | None | https://github.com/francescobrina/hfs-cve-2014-6287-exploit | POC Details |
| 10 | Rejetto http File Server 2.3.x (Reverse shell) | https://github.com/10cks/CVE-2014-6287 | POC Details |
| 11 | HTTP File Server before 2.3c is susceptible to remote command execution. The findMacroMarker function in parserLib.pas allows an attacker to execute arbitrary programs via a %00 sequence in a search action. Therefore, an attacker can obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2014/CVE-2014-6287.yaml | POC Details |
| 12 | Rejetto HttpFileServer 2.3.x - Remote Command Execution (RevShell) | https://github.com/Z3R0-0x30/CVE-2014-6287 | POC Details |
| 13 | This repository contains Detailed explanation and working poc for Rejetto HTTP File Server (HFS) 2.3.x - Remote Command Execution. | https://github.com/rahisec/rejetto-http-file-server-2.3.x-RCE-exploit-CVE-2014-6287 | POC Details |
| 14 | A Rust implementation of the CVE-2014-6287 exploit targeting Rejetto HTTP File Server (HFS) versions 2.3x before 2.3c. | https://github.com/nika0x38/CVE-2014-6287 | POC Details |
| 15 | Remote Command Execution exploit for Rejetto HTTP File Server 2.3.x (CVE-2014-6287) rewritten in Python 3 for modern offensive security testing. | https://github.com/JoaZ94/rejjeto_hfs-rce-exploit-cve-2014-6287 | POC Details |
| 16 | None | https://github.com/jagg3rsec/CVE-2014-6287 | POC Details |
| 17 | Rejetto HttpFileServer 2.3.x - Remote Command Execution (RevShell) | https://github.com/Z3R0space/CVE-2014-6287 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet