Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-23253 PoC — Microsoft Windows Point-to-Point Tunneling Protocol 输入验证错误漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Point-to-Point Tunneling Protocol 输入验证错误漏洞 (CVE-2022-23253)
Description:Microsoft Windows Point-to-Point Tunneling Protocol(PPTP)是美国微软(Microsoft)公司的一种网络协议,通过在基于 TCP/IP 的数据网络上创建虚拟专用网络 (VPN),可以将数据从远程客户端安全传输到私有企业服务器。 Microsoft Windows Point-to-Point Tunneling Protocol存在输入验证错误漏洞。以下产品和版本受到影响:Windows 8.1 for x64-based systems,Windo
Description
CVE-2022-23253 PoC
Readme
# CVE-2022-23253-PoC
CVE-2022-23253 PoC
File Snapshot

[4.0K] /data/pocs/e7bd42f5bde77d4aa812894701437ec1adebc327 ├── [ 14K] CVE-2022-23253.py └── [ 40] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.