Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Checks for CVE-2020-11651 and CVE-2020-11652 | https://github.com/chef-cft/salt-vulnerabilities | POC Details |
| 2 | Salt security backports for CVE-2020-11651 & CVE-2020-11652 | https://github.com/rossengeorgiev/salt-security-backports | POC Details |
| 3 | None | https://github.com/dozernz/cve-2020-11651 | POC Details |
| 4 | CVE-2020-11651: Proof of Concept | https://github.com/0xc0d/CVE-2020-11651 | POC Details |
| 5 | PoC exploit of CVE-2020-11651 and CVE-2020-11652 | https://github.com/jasperla/CVE-2020-11651-poc | POC Details |
| 6 | CVE-2020-11651&&CVE-2020-11652 EXP | https://github.com/bravery9/SaltStack-Exp | POC Details |
| 7 | PoC for CVE-2020-11651 | https://github.com/kevthehermit/CVE-2020-11651 | POC Details |
| 8 | None | https://github.com/lovelyjuice/cve-2020-11651-exp-plus | POC Details |
| 9 | CVE-2020-11651&&CVE-2020-11652 EXP | https://github.com/ssrsec/CVE-2020-11651-CVE-2020-11652-EXP | POC Details |
| 10 | PoC for CVE-2020-11651 | https://github.com/RakhithJK/CVE-2020-11651 | POC Details |
| 11 | CVE-2020-11651&&CVE-2020-11652 EXP | https://github.com/5l1v3r1/SaltStack-Exp-1 | POC Details |
| 12 | Scanning tool to test for SaltStack vulnerabilities CVE-2020-11651 & CVE-2020-11652. | https://github.com/appcheck-ng/salt-rce-scanner-CVE-2020-11651-CVE-2020-11652 | POC Details |
| 13 | None | https://github.com/puckiestyle/cve-2020-11651 | POC Details |
| 14 | Repository that contains a CVE-2020-11651 Exploit updated to work with the latest versions of python. | https://github.com/hardsoftsecurity/CVE-2020-11651-PoC | POC Details |
| 15 | A script that exploits SaltStack CVE-2020-11651 and CVE-2020-11652 to add new users to a vulnerable Salt master by injecting entries into /etc/passwd and /etc/shadow. | https://github.com/Drew-Alleman/CVE-2020-11651 | POC Details |
| 16 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/SaltStack%20%E6%B0%B4%E5%B9%B3%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%20CVE-2020-11651.md | POC Details |
| 17 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Saltstack%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2020-11651%2011652.md | POC Details |
| 18 | https://github.com/vulhub/vulhub/blob/master/saltstack/CVE-2020-11651/README.md | POC Details |
No public POC found.
Login to generate AI POCNo comments yet