尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Tool for exploit CVE-2015-3306 | https://github.com/shk0x/cpx_proftpd | POC详情 |
| 2 | Exploits the arbitrary file write bug in proftpd (CVE-2015-3306) attempts code execution | https://github.com/nootropics/propane | POC详情 |
| 3 | ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container | https://github.com/t0kx/exploit-CVE-2015-3306 | POC详情 |
| 4 | ProFTPd 1.3.5 - File Copy | https://github.com/davidtavarez/CVE-2015-3306 | POC详情 |
| 5 | cve-2015-3306 | https://github.com/cved-sources/cve-2015-3306 | POC详情 |
| 6 | cve-2015-3306 docker image | https://github.com/hackarada/cve-2015-3306 | POC详情 |
| 7 | None | https://github.com/cdedmondson/Modified-CVE-2015-3306-Exploit | POC详情 |
| 8 | Converted with tweaks from a metasploit module as an exercise for OSCP studying and exploit development | https://github.com/cd6629/CVE-2015-3306-Python-PoC | POC详情 |
| 9 | None | https://github.com/0xm4ud/ProFTPD_CVE-2015-3306 | POC详情 |
| 10 | An implementation of CVE-2015-3306 | https://github.com/jptr218/proftpd_bypass | POC详情 |
| 11 | PoC for CVE-2015-3306 a arbitrary file write vulnerability in ProFTPd 1.3.5 | https://github.com/xchg-rax-rax/CVE-2015-3306- | POC详情 |
| 12 | Script that exploits the vulnerability of the ProFTP 1.3.5 service with CVE-2015-3306 | https://github.com/JoseLRC97/ProFTPd-1.3.5-mod_copy-Remote-Command-Execution | POC详情 |
| 13 | ProFTPD 1.3.5 contains a remote code execution vulnerability via the mod_copy module which allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands. | https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2015/CVE-2015-3306.yaml | POC详情 |
| 14 | This contains single-file exploit for ProFTPd 1.3.5 mod_copy (CVE-2015-3306) vulnerability, especially for TryHackMe Kenobi Lab. | https://github.com/Z3R0-0x30/CVE-2015-3306 | POC详情 |
| 15 | None | https://github.com/donmedfor/CVE-2015-3306 | POC详情 |
| 16 | This is a customized script to help solve the lab on remote code execution under the CVE-2015-3306 lab. | https://github.com/cybersensei-EH/hackviser_labs_CVE-2015-3306 | POC详情 |
| 17 | CVE-2015-3306 - ProFTPD - RCE Home Lab setup (Docker) easy to use for Red Teaming or Penetration Testing | https://github.com/netw0rk7/CVE-2015-3306-Home-Lab | POC详情 |
| 18 | Exploitation report for ProFTPD 1.3.5 mod_copy (CVE-2015-3306) lab. | https://github.com/canpilayda/proftpd-mod_copy-cve-2015-3306 | POC详情 |
| 19 | Tool for exploit CVE-2015-3306 | https://github.com/xyk0x/cpx_proftpd | POC详情 |
| 20 | This contains single-file exploit for ProFTPd 1.3.5 mod_copy (CVE-2015-3306) vulnerability, especially for TryHackMe Kenobi Lab. | https://github.com/Z3R0space/CVE-2015-3306 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论