Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-21173 PoC — Google Pixel 安全漏洞

Source
Associated Vulnerability
Title:Google Pixel 安全漏洞 (CVE-2023-21173)
Description:Google Pixel是美国谷歌(Google)公司的一款智能手机。 Google Pixel存在安全漏洞,该漏洞源于 DataUsageList.java 文件的 multiple methods 存在缺少权限检查,有一种可能的方法可以了解管理员用户的网络活动。
Description
 CVE-2023-21173 Exploit - Remote Code Execution in SQL Server 2022
Readme
# Multi-Service Vulnerability Scanner

## Supported Vulnerabilities & Attack Vectors

### Microsoft SQL Server Vulnerabilities
- **CVE-2023-21173**: Remote Code Execution in SQL Server 2022
- Potential exploitation of:
  - Weak authentication configurations
  - Misconfigured server principals
  - xp_cmdshell abuse
  - Advanced options manipulation

### Common Vulnerability Classes
1. **Authentication Bypass**
   - Weak/default credentials
   - Empty password attempts
   - Misconfigured authentication mechanisms

2. **Service Enumeration**
   - FTP anonymous access
   - Open database ports
   - Exposed service information

3. **Potential Attack Surfaces**
   - MSSQL remote command execution
   - FTP information disclosure
   - Network service fingerprinting

### Targeted Services
- Microsoft SQL Server
- FTP Services
- Windows Remote Management (WinRM)
- HTTP/Web Services

## Disclaimer

🚨 **LEGAL WARNING** 🚨
- Use ONLY on systems you own or have explicit written permission
- Unauthorized scanning and exploitation is illegal
- Intended for authorized penetration testing and security research

## Usage

```bash
python multi_exploit.py <target_ip>
```

## Requirements

- Python 3.7+
- Required libraries: 
  - requests
  - pymssql
  - urllib3
  - colorama

## Ethical Considerations

This tool is designed for:
- Security professionals
- Penetration testers
- Vulnerability researchers

### Responsible Disclosure
- Always obtain proper authorization
- Report vulnerabilities to appropriate parties
- Follow responsible disclosure guidelines

## Contribution

Contributions welcome! Please:
1. Fork the repository
2. Create a feature branch
3. Document any new vulnerability classes
4. Provide proof-of-concept
5. Submit a pull request
File Snapshot

[4.0K] /data/pocs/c1fae883339deda1225816fa226a1753235384df ├── [6.4K] multi-exploit.py └── [1.7K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.