尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Microsoft | ASP.NET Core 2.3 | 2.3 ~ 2.3.6 | - | |
| Microsoft | ASP.NET Core 8.0 | 8.0 ~ 8.0.21 | - | |
| Microsoft | ASP.NET Core 9.0 | 9.0 ~ 9.0.10 | - | |
| Microsoft | Microsoft Visual Studio 2022 version 17.10 | 17.10.0 ~ 17.10.20 | - | |
| Microsoft | Microsoft Visual Studio 2022 version 17.12 | 17.12.0 ~ 17.12.13 | - | |
| Microsoft | Microsoft Visual Studio 2022 version 17.14 | 17.14.0 ~ 17.14.17 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Playground to experiment with different behavior on patched/unpatched Kestrel for the CVE-2025-55315 HTTP smuggling vulnerability | https://github.com/nickcopi/CVE-2025-55315-detection-playground | POC详情 |
| 2 | None | https://github.com/sirredbeard/CVE-2025-55315-repro | POC详情 |
| 3 | None | https://github.com/snowcrashlord/CVE-2025-55315 | POC详情 |
| 4 | None | https://github.com/RootAid/CVE-2025-55315 | POC详情 |
| 5 | None | https://github.com/digitalsnemesis/CVE-2025-55315 | POC详情 |
| 6 | 专业级HTTP请求走私漏洞利用与自动化渗透测试工具 | https://github.com/7huukdlnkjkjba/CVE-2025-55315- | POC详情 |
| 7 | Quick and Simple Scripts to Scan for Vulnerable Servers and Packet Level Monitors | https://github.com/jlinebau/CVE-2025-55315-Scanner-Monitor | POC详情 |
| 8 | None | https://github.com/blackquantas/CVE-2025-55315 | POC详情 |
| 9 | CVE-2025-55315 PoC Exploit | https://github.com/ZemarKhos/CVE-2025-55315-PoC-Exploit | POC详情 |
| 10 | Proof-of-concept exploit for CVE-2025-55315 (.NET HTTP Request Smuggling). Demonstrates how improperly parsed chunked encoding lets attackers smuggle requests past proxies and load balancers in vulnerable ASP.NET Core/Kestrel servers. | https://github.com/MartinFabianIonut/CVE-2025-55315 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论