尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935) | https://github.com/bao7uo/RAU_crypto | POC详情 |
| 2 | Arbitrary code execution analysis based on Telerik-UI. This will be done so that the article can be read by others. The document provides an in-depth explanation of the various vectors involved with Telerik-UI for ASP.NET AJAX, as well as POST requests, the architecture of ASP.NET AJAX, | https://github.com/KasunPriyashan/Unrestricted-File-Upload-by-Weak-Encryption-affected-versions-CVE-2017-11317-Remote-Code-Execut | POC详情 |
| 3 | Unrestricted File Upload by Weak Encryption affected versions (CVE-2017-11317) 2. Remote Code Execution by Insecure Deserialization - (CVE-2019-18935) | https://github.com/KasunPriyashan/Telerik-UI-ASP.NET-AJAX-Exploitation | POC详情 |
| 4 | None | https://github.com/hlong12042/CVE-2017-11317-and-CVE-2017-11357-in-Telerik | POC详情 |
| 5 | None | https://github.com/0xr2r/CVE-2017-11317-auto-exploit- | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论