Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-41717 PoC — Google Golang 其他漏洞

Source
Associated Vulnerability
Title:Google Golang 其他漏洞 (CVE-2022-41717)
Description:Google Golang是美国谷歌(Google)公司的一种静态强类型、编译型语言。Go的语法接近C语言,但对于变量的声明有所不同。Go支持垃圾回收功能。Go的并行模型是以东尼·霍尔的通信顺序进程(CSP)为基础,采取类似模型的其他语言包括Occam和Limbo,但它也具有Pi运算的特征,比如通道传输。在1.8版本中开放插件(Plugin)的支持,这意味着现在能从Go中动态加载部分函数。 Google Golang 存在安全漏洞。攻击者利用该漏洞导致内存过度增长。
Description
Exploit for CVE-2022-41717
Readme
**Exploit for CVE-2022-41717**
File Snapshot

[4.0K] /data/pocs/32741d498257912057aa99c93e844c478768191c ├── [ 182] go.mod ├── [ 467] go.sum ├── [ 11K] LICENSE ├── [1.8K] main.go └── [ 31] README.md 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.