Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/acole76/cve-2018-6574 | POC Details |
| 2 | CVE-2018-6574 POC : golang 'go get' remote command execution during source code build | https://github.com/neargle/Go-Get-RCE-CVE-2018-6574-POC | POC Details |
| 3 | CVE-2018-6574 for pentesterLAB | https://github.com/wb4r/go-get-rce | POC Details |
| 4 | cve-2018-6574 @pentesterlab | https://github.com/ahmetmanga/go-get-rce | POC Details |
| 5 | None | https://github.com/ahmetmanga/cve-2018-6574 | POC Details |
| 6 | None | https://github.com/redirected/cve-2018-6574 | POC Details |
| 7 | None | https://github.com/20matan/CVE-2018-6574-POC | POC Details |
| 8 | CVE-2018-6574 | https://github.com/zur250/Zur-Go-GET-RCE-Solution | POC Details |
| 9 | None | https://github.com/mekhalleh/cve-2018-6574 | POC Details |
| 10 | CVE-2018-6574 | https://github.com/veter069/go-get-rce | POC Details |
| 11 | None | https://github.com/duckzsc2/CVE-2018-6574-POC | POC Details |
| 12 | None | https://github.com/dollyptm/cve-2018-6574 | POC Details |
| 13 | A simple POC for CVE-2018-6574 | https://github.com/qweraqq/CVE-2018-6574 | POC Details |
| 14 | CVE-2018-6574 | https://github.com/d4rkshell/go-get-rce | POC Details |
| 15 | None | https://github.com/chaosura/CVE-2018-6574 | POC Details |
| 16 | ptl cve-2018-6574 | https://github.com/french560/ptl6574 | POC Details |
| 17 | None | https://github.com/InfoSecJack/CVE-2018-6574 | POC Details |
| 18 | CVE-2018-6574 go get RCE | https://github.com/asavior2/CVE-2018-6574 | POC Details |
| 19 | test for CVE-2018-6574: go get RCE pentesterlab | https://github.com/drset/golang | POC Details |
| 20 | None | https://github.com/frozenkp/CVE-2018-6574 | POC Details |
| 21 | pentesterlab test payload | https://github.com/kev-ho/cve-2018-6574-payload | POC Details |
| 22 | None | https://github.com/sdosis/cve-2018-6574 | POC Details |
| 23 | None | https://github.com/No1zy/CVE-2018-6574-PoC | POC Details |
| 24 | None | https://github.com/nthuong95/CVE-2018-6574 | POC Details |
| 25 | None | https://github.com/AdriVillaB/CVE-2018-6574 | POC Details |
| 26 | None | https://github.com/yitingfan/CVE-2018-6574_demo | POC Details |
| 27 | None | https://github.com/mhamed366/CVE-2018-6574 | POC Details |
| 28 | None | https://github.com/Eugene24/CVE-2018-6574 | POC Details |
| 29 | None | https://github.com/coblax/CVE-2018-6574 | POC Details |
| 30 | CVE-2018-6574 | https://github.com/darthvader-htb/CVE-2018-6574 | POC Details |
| 31 | Vulnerble-code | https://github.com/it3x55/CVE-2018-6574 | POC Details |
| 32 | CVE-2018-6574: go get RCE solution for pentesterlab challenge | https://github.com/Malone5923/CVE-2018-6574-go-get-RCE | POC Details |
| 33 | None | https://github.com/illnino/CVE-2018-6574 | POC Details |
| 34 | None | https://github.com/TakuCoder/CVE-2018-6574 | POC Details |
| 35 | None | https://github.com/kawkab101/cve-2018-6574 | POC Details |
| 36 | None | https://github.com/lsnakazone/cve-2018-6574 | POC Details |
| 37 | None | https://github.com/pswalia2u/CVE-2018-6574 | POC Details |
| 38 | A simple POC for CVE-2018-6574 | https://github.com/jongmartinez/CVE-2018-6574-POC | POC Details |
| 39 | None | https://github.com/azzzzzzzzzzzzzzzzz/CVE-2018-6574 | POC Details |
| 40 | None | https://github.com/noname-nohost/CVE-2018-6574 | POC Details |
| 41 | None | https://github.com/shadofren/CVE-2018-6574 | POC Details |
| 42 | None | https://github.com/NikolaT3sla/cve-2018-6574 | POC Details |
| 43 | None | https://github.com/vishack/CVE-2018-6574 | POC Details |
| 44 | None | https://github.com/PLP-Orange/cve-2018-6574-exercise | POC Details |
| 45 | None | https://github.com/purgedemo/CVE-2018-6574 | POC Details |
| 46 | None | https://github.com/purgedemo/CVE-2018-6574_2 | POC Details |
| 47 | None | https://github.com/killtr0/POC-CVE-2018-6574 | POC Details |
| 48 | solution | https://github.com/theJuan1112/pentesterlab-cve-2018-6574 | POC Details |
| 49 | None | https://github.com/MohamedTarekq/test-CVE-2018-6574- | POC Details |
| 50 | None | https://github.com/OLAOLAOLA789/CVE-2018-6574 | POC Details |
| 51 | None | https://github.com/repos13579/labCVE-2018-6574 | POC Details |
| 52 | Pentesterlabs | https://github.com/yashanand/cve-2018-6574 | POC Details |
| 53 | go rce | https://github.com/jaya522/CVE-2018-6574-go-get-RCE | POC Details |
| 54 | None | https://github.com/noobTest1122/CVE-2018-6574 | POC Details |
| 55 | None | https://github.com/ErnestZiemkowski/cve-2018-6574 | POC Details |
| 56 | None | https://github.com/l3ouu4n9/CVE-2018-6574-POC | POC Details |
| 57 | PTLabs | https://github.com/R3dAlch3mist/cve-2018-6574 | POC Details |
| 58 | Remote command execution in Golang go get command allows an attacker to gain code execution on a system by installing a malicious library. | https://github.com/j4k0m/CVE-2018-6574 | POC Details |
| 59 | Exploit for remote command execution in Golang go get command. | https://github.com/Devang-Solanki/CVE-2018-6574 | POC Details |
| 60 | None | https://github.com/ItsFadinG/CVE-2018-6574 | POC Details |
| 61 | None | https://github.com/imojne/CVE-2018-6574-POC | POC Details |
| 62 | cve-2018-6574 | https://github.com/twseptian/cve-2018-6574 | POC Details |
| 63 | None | https://github.com/the-valluvarsploit/CVE-2018-6574 | POC Details |
| 64 | None | https://github.com/yavolo/CVE-2018-6574 | POC Details |
| 65 | CVE-2018-6574: go get RCE | https://github.com/ThaFWord/pentesterlab | POC Details |
| 66 | Exploit for Pentester Labs | https://github.com/Cypheer/exploit_CVE-2018-6574 | POC Details |
| 67 | None | https://github.com/jftierno/CVE-2018-6574-2 | POC Details |
| 68 | None | https://github.com/tjcim/cve-2018-6574 | POC Details |
| 69 | None | https://github.com/markisback/CVE-2018-6574 | POC Details |
| 70 | The issue is due to the fact that when installing a package, Golang will build native extensions. This can be used to pass additional flags to the compiler to gain code execution. For example, CFLAGS can be used. | https://github.com/hasharmujahid/CVE-2018-6574-go-get-RCE | POC Details |
| 71 | None | https://github.com/jeyaseelans86/CVE-2018-6574 | POC Details |
| 72 | None | https://github.com/jeyaseelans86/new-CVE-2018-6574 | POC Details |
| 73 | None | https://github.com/chr1sM/CVE-2018-6574 | POC Details |
| 74 | None | https://github.com/mux0x/CVE-2018-6574 | POC Details |
| 75 | CVE-2018-6574 go get | https://github.com/antunesmpedro/CVE-2018-6574 | POC Details |
| 76 | None | https://github.com/Yealid/CVE-2018-6574 | POC Details |
| 77 | Used for a PentesterLab exercise | https://github.com/jahwni/CVE-2018-6574 | POC Details |
| 78 | None | https://github.com/NsByte/CVE-2018-6574 | POC Details |
| 79 | None | https://github.com/Zeeshan12340/CVE-2018-6574 | POC Details |
| 80 | None | https://github.com/moTorky/CVE-2018-6574-POC | POC Details |
| 81 | CVE-2018-6574: go get RCE | https://github.com/Ashved9/Orange | POC Details |
| 82 | CVE-2018-6574 this vulnerability impacts Golang go get command and allows an attacker to gain code execution on a system by installing a malicious library, this vulnerability was fixed in Go 1.8. 7, 1.9. 4 and 1.10rc2. Golang will build native extensions. | https://github.com/zerbaliy3v/cve-2018-6574-exploit | POC Details |
| 83 | Pentesterlabs | https://github.com/sec000/cve-2018-6574 | POC Details |
| 84 | None | https://github.com/jftierno/-CVE-2018-6574 | POC Details |
| 85 | None | https://github.com/jftierno/CVE-2018-6574 | POC Details |
| 86 | None | https://github.com/faiqu3/cve-2018-6574 | POC Details |
| 87 | CVE-2018-6574-go-get-RCE | https://github.com/Dannners/CVE-2018-6574-go-get-RCE | POC Details |
| 88 | None | https://github.com/bme2003/CVE-2018-6574 | POC Details |
| 89 | None | https://github.com/athulmur/CVE-2018-6574 | POC Details |
| 90 | pentesterlab | https://github.com/iNoSec2/cve-2018-6574 | POC Details |
| 91 | None | https://github.com/ttyA0/cve-2018-6574 | POC Details |
| 92 | CVE-2018-6574: go get | https://github.com/faqihudin13/CVE-2018-6574 | POC Details |
| 93 | None | https://github.com/lisu60/cve-2018-6574 | POC Details |
| 94 | None | https://github.com/Saboor-Hakimi/CVE-2018-6574 | POC Details |
| 95 | Remote command execution in Golang go get command allows an attacker to gain code execution on a system by installing a malicious library. | https://github.com/seoqqq/CVE-2018-6574 | POC Details |
| 96 | OrangeBadge - Exercise CVE-2018-6574: go get RCE | https://github.com/elw0od/PentesterLab | POC Details |
| 97 | None | https://github.com/rootxjs/CVE-2018-6574 | POC Details |
| 98 | None | https://github.com/rootxjs/new-CVE-2018-6574 | POC Details |
| 99 | Golang cgo exploit for CVE-2018-6574 | https://github.com/paulogmota/CVE-2018-6574 | POC Details |
| 100 | POC of CVE-2018-6574 to solve Pentestlab challenge | https://github.com/solovvway/CVE-2018-6574 | POC Details |
| 101 | None | https://github.com/memmas/CVE-2018-6574 | POC Details |
| 102 | Ptlabs exploit | https://github.com/adendarys/CVE-2018-6574 | POC Details |
| 103 | None | https://github.com/YoussefSalama1/CVE-2018-6574 | POC Details |
| 104 | None | https://github.com/Rezy-Dev/CVE-2018-6574 | POC Details |
| 105 | Testing | https://github.com/hbxxv/CVE-2018-6574 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet