尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Apache Software Foundation | Apache Struts | 2.0.0 to 2.5.29 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | 远程代码执行S2-062 CVE-2021-31805验证POC | https://github.com/pyroxenites/s2-062 | POC详情 |
| 2 | S2-062 (CVE-2021-31805) / S2-061 / S2-059 RCE | https://github.com/Wrin9/CVE-2021-31805 | POC详情 |
| 3 | Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) | 反弹Shell | https://github.com/Axx8/Struts2_S2-062_CVE-2021-31805 | POC详情 |
| 4 | Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) 支持批量扫描漏洞及漏洞利用 | https://github.com/jax7sec/S2-062 | POC详情 |
| 5 | PoC for CVE-2021-31805 (Apache Struts2) | https://github.com/aeyesec/CVE-2021-31805 | POC详情 |
| 6 | Apache Struts2 S2-062(CVE-2021-31805)远程代码执行批量检测(无利用) | https://github.com/fleabane1/CVE-2021-31805-POC | POC详情 |
| 7 | S2-061/S2-062 Struts2 远程命令执行漏洞 POC&EXP | https://github.com/z92g/CVE-2021-31805 | POC详情 |
| 8 | Vulnerable environment of CVE-2021-31805 (S2-062) for testing | https://github.com/nth347/CVE-2021-31805 | POC详情 |
| 9 | Apache Struts2 S2-062 is vulnerable to remote code execution. The fix issued for CVE-2020-17530 (S2-061) was incomplete, meaning some of the tag's attributes could still perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-31805.yaml | POC详情 |
| 10 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Struts2%20S2-062%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-31805.md | POC详情 |
| 11 | Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) | 反弹Shell | https://github.com/SecNN/Struts2_S2-062_CVE-2021-31805 | POC详情 |
| 12 | Apache Struts2 S2-062(CVE-2021-31805)远程代码执行批量检测(无利用) | https://github.com/JordanANDJohn/CVE-2021-31805-POC | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论