Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit | https://github.com/chebuya/Havoc-C2-SSRF-poc | POC Details |
| 2 | None | https://github.com/HimmeL-Byte/CVE-2024-41570-SSRF-RCE | POC Details |
| 3 | This is a modified version of the CVE-2024-41570 SSRF PoC from @chebuya chained with the auth RCE PoC from @hyperreality. This exploit is made to execute code remotely due to multiple vulnerabilities on Havoc C2 Framework. (https://github.com/HavocFramework/Havoc) | https://github.com/sebr-dev/Havoc-C2-SSRF-to-RCE | POC Details |
| 4 | Automated Reverse Shell Exploit via WebSocket | Havoc-C2-SSRF with RCE | https://github.com/kit4py/CVE-2024-41570 | POC Details |
| 5 | This is a Chained RCE in the Havoc C2 framework using github.com/chebuya and github.com/IncludeSecurity pocs | https://github.com/thisisveryfunny/CVE-2024-41570-Havoc-C2-RCE | POC Details |
| 6 | CVE-2024-41570 is a critical SSRF vulnerability in Havoc C2 v0.7 that allows an unauthenticated attacker to send arbitrary network requests from the team server. This flaw can be exploited for internal network access or remote code execution (RCE). | https://github.com/0xLynk/CVE-2024-41570-POC | POC Details |
| 7 | Automated Reverse Shell Exploit via WebSocket | Havoc-C2-SSRF with RCE | https://github.com/diemoeve/CVE-2024-41570 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet