尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Ivanti | Connect Secure | 22.7R2.6 | - | |
| Ivanti | Policy Secure | 22.7R1.4 | - | |
| Ivanti | Neurons for ZTA gateways | 22.8R2.2 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Prevent CVE-2025-22457 and other security problems with Juniper/Ivanti Secure Connect SSL VPN | https://github.com/Vinylrider/ivantiunlocker | POC详情 |
| 2 | CVE-2025-22457 Python and Metasploit PoC for Ivanti unauthenticated RCE | https://github.com/N4SL1/CVE-2025-22457-PoC | POC详情 |
| 3 | PoC for CVE-2025-22457 | https://github.com/sfewer-r7/CVE-2025-22457 | POC详情 |
| 4 | CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE | https://github.com/securekomodo/CVE-2025-22457 | POC详情 |
| 5 | None | https://github.com/llussiess/CVE-2025-22457 | POC详情 |
| 6 | PoC CVE-2025-22457 | https://github.com/TRone-ux/CVE-2025-22457 | POC详情 |
| 7 | CVE-2025-22457 | https://github.com/B1ack4sh/Blackash-CVE-2025-22457 | POC详情 |
| 8 | Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 contain a stack-based buffer overflow caused by improper input handling, allowing remote attackers to execute arbitrary code without authentication. | https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2025/CVE-2025-22457.yaml | POC详情 |
| 9 | CVE-2025-22457 | https://github.com/Ashwesker/Blackash-CVE-2025-22457 | POC详情 |
| 10 | CVE-2025-22457 | https://github.com/Ashwesker/Ashwesker-CVE-2025-22457 | POC详情 |
未找到公开 POC。
登录以生成 AI POCZaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.