尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| The GNU C Library | glibc | 2.1.93 ~ 2.40 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Quick mitigation script | https://github.com/mattaperkins/FIX-CVE-2024-2961 | POC详情 |
| 2 | CVE-2024–2961 Security Issue Mitigation Script | https://github.com/rvizx/CVE-2024-2961 | POC详情 |
| 3 | Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv() | https://github.com/ambionics/cnext-exploits | POC详情 |
| 4 | Bash script to patch for CVE-2024-2961 | https://github.com/absolutedesignltd/iconvfix | POC详情 |
| 5 | This repository contains a C program to test for CVE-2024-2961, a buffer overflow vulnerability in the iconv() function of glibc. | https://github.com/exfil0/test_iconv | POC详情 |
| 6 | None | https://github.com/tnishiox/cve-2024-2961 | POC详情 |
| 7 | None | https://github.com/kjdfklha/CVE-2024-2961_poc | POC详情 |
| 8 | This script demonstrates a proof-of-concept (PoC) for exploiting a file read vulnerability in the iconv library, as detailed in Ambionics Security's blog https://www.ambionics.io/blog/iconv-cve-2024-2961-p1. | https://github.com/kyotozx/CVE-2024-2961-Remote-File-Read | POC详情 |
| 9 | Uses CVE-2024-2961 to perform an arbitrary file read | https://github.com/4wayhandshake/CVE-2024-2961 | POC详情 |
| 10 | CVE-2024-2961 Cnext RCE Exploit with Buddyforms 2.7.7 | https://github.com/suce0155/CVE-2024-2961_buddyforms_2.7.7 | POC详情 |
| 11 | To use, implement the Remote class, which tells the exploit how to send the payload. | https://github.com/regantemudo/PHP-file-read-to-RCE-CVE-2024-2961- | POC详情 |
| 12 | PHP Local File Read vulnerability leading to Remote Code Execution | https://github.com/projectdiscovery/nuclei-templates/blob/main/dast/cves/2024/CVE-2024-2961.yaml | POC详情 |
| 13 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E8%AF%AD%E8%A8%80%E6%BC%8F%E6%B4%9E/PHP%20%E5%88%A9%E7%94%A8%20GNU%20C%20Iconv%20%E5%B0%86%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%8F%90%E5%8D%87%E8%87%B3%20RCE%20CVE-2024-2961.md | POC详情 |
| 14 | https://github.com/vulhub/vulhub/blob/master/php/CVE-2024-2961/README.md | POC详情 | |
| 15 | Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv() | https://github.com/scriptSails/glibcs | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论