尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX. | https://github.com/noperator/CVE-2019-18935 | POC详情 |
| 2 | TelerikUI Vulnerability Scanner (CVE-2019-18935) | https://github.com/becrevex/Telerik_CVE-2019-18935 | POC详情 |
| 3 | TelerikUI Vulnerability Scanner (CVE-2019-18935) | https://github.com/ThanHuuTuan/Telerik_CVE-2019-18935 | POC详情 |
| 4 | This project for CVE-2019-18935 | https://github.com/ThanHuuTuan/CVE_2019_18935 | POC详情 |
| 5 | [CVE-2019-18935] Telerik UI for ASP.NET AJAX (RadAsyncUpload Handler) .NET JSON Deserialization | https://github.com/murataydemir/CVE-2019-18935 | POC详情 |
| 6 | TelerikUI Vulnerability Scanner (CVE-2019-18935) | https://github.com/appliedi/Telerik_CVE-2019-18935 | POC详情 |
| 7 | CVE-2019-18935 | https://github.com/random-robbie/CVE-2019-18935 | POC详情 |
| 8 | None | https://github.com/0xAgun/CVE-2019-18935-checker | POC详情 |
| 9 | None | https://github.com/dust-life/CVE-2019-18935-memShell | POC详情 |
| 10 | CVE-2019-18935: Remote Code Execution | https://github.com/clarkvoss/telerik | POC详情 |
| 11 | None | https://github.com/ekkoo-z/CVE-2019-18935-bypasswaf | POC详情 |
| 12 | Telerik CVE-2019-18935 Vulnerability Scanner | https://github.com/0xsharz/telerik-scanner-CVE-2019-18935 | POC详情 |
| 13 | In-depth study of CVE-2019-18935 affecting Telerik UI for ASP.NET AJAX. Covers .NET deserialization vulnerability, RadAsyncUpload handler, gadget chains, mixed-mode assembly exploitation, and mitigation strategies. | https://github.com/quyt0/CVE-2019-18935-exploit-study | POC详情 |
| 14 | Exploit for CVE-2019-18935 | https://github.com/menashe12346/CVE-2019-18935 | POC详情 |
| 15 | None | https://github.com/alanbarret/CVE-2019-18935 | POC详情 |
未找到公开 POC。
登录以生成 AI POCkatana