Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Tool for exploit CVE-2015-3306 | https://github.com/shk0x/cpx_proftpd | POC Details |
| 2 | Exploits the arbitrary file write bug in proftpd (CVE-2015-3306) attempts code execution | https://github.com/nootropics/propane | POC Details |
| 3 | ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container | https://github.com/t0kx/exploit-CVE-2015-3306 | POC Details |
| 4 | ProFTPd 1.3.5 - File Copy | https://github.com/davidtavarez/CVE-2015-3306 | POC Details |
| 5 | cve-2015-3306 | https://github.com/cved-sources/cve-2015-3306 | POC Details |
| 6 | cve-2015-3306 docker image | https://github.com/hackarada/cve-2015-3306 | POC Details |
| 7 | None | https://github.com/cdedmondson/Modified-CVE-2015-3306-Exploit | POC Details |
| 8 | Converted with tweaks from a metasploit module as an exercise for OSCP studying and exploit development | https://github.com/cd6629/CVE-2015-3306-Python-PoC | POC Details |
| 9 | None | https://github.com/0xm4ud/ProFTPD_CVE-2015-3306 | POC Details |
| 10 | An implementation of CVE-2015-3306 | https://github.com/jptr218/proftpd_bypass | POC Details |
| 11 | PoC for CVE-2015-3306 a arbitrary file write vulnerability in ProFTPd 1.3.5 | https://github.com/xchg-rax-rax/CVE-2015-3306- | POC Details |
| 12 | Script that exploits the vulnerability of the ProFTP 1.3.5 service with CVE-2015-3306 | https://github.com/JoseLRC97/ProFTPd-1.3.5-mod_copy-Remote-Command-Execution | POC Details |
| 13 | ProFTPD 1.3.5 contains a remote code execution vulnerability via the mod_copy module which allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands. | https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2015/CVE-2015-3306.yaml | POC Details |
| 14 | This contains single-file exploit for ProFTPd 1.3.5 mod_copy (CVE-2015-3306) vulnerability, especially for TryHackMe Kenobi Lab. | https://github.com/Z3R0-0x30/CVE-2015-3306 | POC Details |
| 15 | None | https://github.com/donmedfor/CVE-2015-3306 | POC Details |
| 16 | This is a customized script to help solve the lab on remote code execution under the CVE-2015-3306 lab. | https://github.com/cybersensei-EH/hackviser_labs_CVE-2015-3306 | POC Details |
| 17 | CVE-2015-3306 - ProFTPD - RCE Home Lab setup (Docker) easy to use for Red Teaming or Penetration Testing | https://github.com/netw0rk7/CVE-2015-3306-Home-Lab | POC Details |
| 18 | Exploitation report for ProFTPD 1.3.5 mod_copy (CVE-2015-3306) lab. | https://github.com/canpilayda/proftpd-mod_copy-cve-2015-3306 | POC Details |
| 19 | Tool for exploit CVE-2015-3306 | https://github.com/xyk0x/cpx_proftpd | POC Details |
| 20 | This contains single-file exploit for ProFTPd 1.3.5 mod_copy (CVE-2015-3306) vulnerability, especially for TryHackMe Kenobi Lab. | https://github.com/Z3R0space/CVE-2015-3306 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet