关联漏洞
描述
PoC Python script as an exercice from tryhackme.
介绍
# CVE-2012-2982_Python
PoC Python script as an exercice from tryhackme: https://tryhackme.com/room/intropocscripting
This is the metasploit CVE: https://www.exploit-db.com/exploits/21851
Those are the changes done after the discovery of the Exploit: https://github.com/webmin/webmin/commit/1f1411fe7404ec3ac03e803cfa7e01515e71a213
----
### How to use:
clone to repo, and then look at the script to see what you need to change.

文件快照
[4.0K] /data/pocs/49bb39e6a08537c1528d5f81911bc0337b202cef
├── [4.0K] assets
│ └── [142K] screen.png
├── [1.0K] exploit.py
└── [ 478] README.md
1 directory, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。