Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935) | https://github.com/bao7uo/RAU_crypto | POC Details |
| 2 | Arbitrary code execution analysis based on Telerik-UI. This will be done so that the article can be read by others. The document provides an in-depth explanation of the various vectors involved with Telerik-UI for ASP.NET AJAX, as well as POST requests, the architecture of ASP.NET AJAX, | https://github.com/KasunPriyashan/Unrestricted-File-Upload-by-Weak-Encryption-affected-versions-CVE-2017-11317-Remote-Code-Execut | POC Details |
| 3 | Unrestricted File Upload by Weak Encryption affected versions (CVE-2017-11317) 2. Remote Code Execution by Insecure Deserialization - (CVE-2019-18935) | https://github.com/KasunPriyashan/Telerik-UI-ASP.NET-AJAX-Exploitation | POC Details |
| 4 | None | https://github.com/hlong12042/CVE-2017-11317-and-CVE-2017-11357-in-Telerik | POC Details |
| 5 | None | https://github.com/0xr2r/CVE-2017-11317-auto-exploit- | POC Details |
No public POC found.
Login to generate AI POCNo comments yet