尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share) | https://github.com/betab0t/cve-2017-7494 | POC详情 |
| 2 | None | https://github.com/homjxi0e/CVE-2017-7494 | POC详情 |
| 3 | SambaCry exploit and vulnerable container (CVE-2017-7494) | https://github.com/opsxcq/exploit-CVE-2017-7494 | POC详情 |
| 4 | CVE-2017-7494 - Detection Scripts | https://github.com/Waffles-2/SambaCry | POC详情 |
| 5 | It is a simple script to exploit RCE for Samba (CVE-2017-7494 ). | https://github.com/brianwrf/SambaHunter | POC详情 |
| 6 | Remote root exploit for the SAMBA CVE-2017-7494 vulnerability | https://github.com/joxeankoret/CVE-2017-7494 | POC详情 |
| 7 | 搭建漏洞利用测试环境 | https://github.com/Zer0d0y/Samba-CVE-2017-7494 | POC详情 |
| 8 | CVE-2017-7494 C poc | https://github.com/incredible1yu/CVE-2017-7494 | POC详情 |
| 9 | cve-2017-7494 | https://github.com/cved-sources/cve-2017-7494 | POC详情 |
| 10 | samba 4.5.9 | https://github.com/john-80/cve-2017-7494 | POC详情 |
| 11 | A remote code execution flaw was found in Samba. A malicious authenticated samba client, having write access to the samba share, could use this flaw to execute arbitrary code as root. | https://github.com/Hansindu-M/CVE-2017-7494_IT19115344 | POC详情 |
| 12 | CVE-2017-7494 python exploit | https://github.com/0xm4ud/noSAMBAnoCRY-CVE-2017-7494 | POC详情 |
| 13 | Exploit CVE-2017-7494 for Net Security course final Assignment. This would reveal the vulnerability of services that run in administrative priority on Linux. | https://github.com/I-Rinka/BIT-EternalBlue-for-macOS_Linux | POC详情 |
| 14 | None | https://github.com/yinyinmeimei/CVE-2017-7494-payload | POC详情 |
| 15 | According to researchers with Rapid7, over 110,000 devices appear on internet, which run stable Samba versions, while 92,500 seem to run unstable Samba versions, for which there is no fix. The newest Samba models, including the models 4.6.x before 4.6.4, 4.5.x before 4.5.10 and 3.5.0 before 4.4.13, was impacted by this error. May 24, 2017, Samba released version 4.6.4, which fixes a serious remote code execution vulnerability, vulnerability number CVE-2017-7494, which affected Samba 3.5.0 onwards. Vulnerability number: CVE-2017-7494 Severity Rating: High Affected software: • Samba Version < 4.6.4 • Samba Version < 4.5.10 • Samba Version < 4.4.14 Unaffected software: • Samba Version = 4.6.4 • Samba Version = 4.5.10 • Samba Version = 4.4.14 | https://github.com/adjaliya/-CVE-2017-7494-Samba-Exploit-POC | POC详情 |
| 16 | SambaCry exploit (CVE-2017-7494) | https://github.com/00mjk/exploit-CVE-2017-7494 | POC详情 |
| 17 | SambaCry (CVE-2017-7494) exploit for Samba | bind shell without Metasploit | https://github.com/d3fudd/CVE-2017-7494_SambaCry | POC详情 |
| 18 | None | https://github.com/yinyinnnnn/CVE-2017-7494-payload | POC详情 |
| 19 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%85%B6%E4%BB%96%E6%BC%8F%E6%B4%9E/Samba%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2017-7494.md | POC详情 |
| 20 | https://github.com/vulhub/vulhub/blob/master/samba/CVE-2017-7494/README.md | POC详情 | |
| 21 | Custom Docker Image | https://github.com/FelipeR-UFBA/cve-2017-7494-fixed | POC详情 |
| 22 | None | https://github.com/sudlit/CVE-2017-7494 | POC详情 |
| 23 | CDT Ansible playbook for deploying CVE-2017-7494 aka "SambaCry" to an Ubuntu box | https://github.com/Zanex360/cdt-samba-deploy | POC详情 |
| 24 | CDT Ansible playbook for deploying CVE-2017-7494 aka "SambaCry" to an Ubuntu box | https://github.com/Zanex360/cdt-vulnsamba-deploy | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论