# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Tool for exploit CVE-2015-3306 | https://github.com/shk0x/cpx_proftpd | POC详情 |
2 | Exploits the arbitrary file write bug in proftpd (CVE-2015-3306) attempts code execution | https://github.com/nootropics/propane | POC详情 |
3 | ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container | https://github.com/t0kx/exploit-CVE-2015-3306 | POC详情 |
4 | ProFTPd 1.3.5 - File Copy | https://github.com/davidtavarez/CVE-2015-3306 | POC详情 |
5 | cve-2015-3306 | https://github.com/cved-sources/cve-2015-3306 | POC详情 |
6 | cve-2015-3306 docker image | https://github.com/hackarada/cve-2015-3306 | POC详情 |
7 | None | https://github.com/cdedmondson/Modified-CVE-2015-3306-Exploit | POC详情 |
8 | Converted with tweaks from a metasploit module as an exercise for OSCP studying and exploit development | https://github.com/cd6629/CVE-2015-3306-Python-PoC | POC详情 |
9 | None | https://github.com/0xm4ud/ProFTPD_CVE-2015-3306 | POC详情 |
10 | An implementation of CVE-2015-3306 | https://github.com/jptr218/proftpd_bypass | POC详情 |
11 | PoC for CVE-2015-3306 a arbitrary file write vulnerability in ProFTPd 1.3.5 | https://github.com/xchg-rax-rax/CVE-2015-3306- | POC详情 |
12 | Script that exploits the vulnerability of the ProFTP 1.3.5 service with CVE-2015-3306 | https://github.com/JoseLRC97/ProFTPd-1.3.5-mod_copy-Remote-Command-Execution | POC详情 |