尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/gopinaath/CVE-2025-49844-discovery | POC详情 |
| 2 | CVE-2025-49844 – Redis Lua Parser Use-After-Free | https://github.com/dwisiswant0/CVE-2025-49844 | POC详情 |
| 3 | CVE-2025-49844 (RediShell) | https://github.com/raminfp/redis_exploit | POC详情 |
| 4 | None | https://github.com/lastvocher/redis-CVE-2025-49844 | POC详情 |
| 5 | Minimal Redis honeypot detecting RediShell (CVE-2025-49844) exploits. | https://github.com/srozb/reditrap | POC详情 |
| 6 | None | https://github.com/pedrorichil/CVE-2025-49844 | POC详情 |
| 7 | A powerful Redis exploitation tool that leverages CVE-2025-4984 | https://github.com/Yuri08loveElaina/CVE-2025-49844 | POC详情 |
| 8 | CVE-2025-49844 POC | https://github.com/YuanBenSir/CVE-2025-49844_POC | POC详情 |
| 9 | CVE-2025-49844 checker | https://github.com/Mufti22/CVE-2025-49844-RediShell-Vulnerability-Scanner | POC详情 |
| 10 | Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. | https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2025/CVE-2025-49844.yaml | POC详情 |
| 11 | None | https://github.com/imbas007/CVE-2025-49844-Vulnerability-Scanner | POC详情 |
| 12 | PoC of RediShell | https://github.com/angelusrivera/CVE-2025-49844 | POC详情 |
| 13 | CVE-2025-49844 POC | https://github.com/MiclelsonCN/CVE-2025-49844_POC | POC详情 |
| 14 | 🔍 Explore and test the CVE-2025-49844 (RediShell) vulnerability in Redis with this practical lab environment for secure education and research. | https://github.com/ksnnd32/redis_exploit | POC详情 |
| 15 | 🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access. | https://github.com/Zain3311/CVE-2025-49844 | POC详情 |
| 16 | اسکپلویت اسیب پذیری CVE-2025-49844 | https://github.com/elyasbassir/CVE-2025-49844 | POC详情 |
| 17 | CVE-2025-49844 | https://github.com/B1ack4sh/Blackash-CVE-2025-49844 | POC详情 |
| 18 | Proof-of-concept for CVE-2025-49844 | https://github.com/saneki/cve-2025-49844 | POC详情 |
| 19 | Untested completition of the Redishell PoC made by AI | https://github.com/Network-Sec/CVE-2025-49844-RediShell-AI-made-Revshell | POC详情 |
| 20 | CVE-2025-49844 | https://github.com/Ashwesker/Blackash-CVE-2025-49844 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论