# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | CVE-2024-11680: Improper Authentication (CWE-287) | https://github.com/famixcm/CVE-2024-11680 | POC详情 |
2 | None | https://github.com/exploitboom/CVE-2024-11680 | POC详情 |
3 | This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues. | https://github.com/D3N14LD15K/CVE-2024-11680_PoC_Exploit | POC详情 |
标题: Check user session before starting to process data · projectsend/projectsend@193367d · GitHub -- 🔗来源链接
标签: patch
标题: metasploit-framework/modules/exploits/linux/http/projectsend_unauth_rce.rb at master · rapid7/metasploit-framework · GitHub -- 🔗来源链接
标签: exploit
标题: nuclei-templates/http/vulnerabilities/projectsend-auth-bypass.yaml at main · projectdiscovery/nuclei-templates · GitHub -- 🔗来源链接
标签: exploit
神龙速读标题: ProjectSend Unauthenticated Configuration Modification | VulnCheck Advisories -- 🔗来源链接
标签: third-party-advisory
神龙速读