尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | A simple python script to check if a service is vulnerable | https://github.com/MaanVader/CVE-2023-27350-POC | POC详情 |
| 2 | None | https://github.com/0ximan1337/CVE-2023-27350-POC | POC详情 |
| 3 | Proof of Concept Exploit for PaperCut CVE-2023-27350 | https://github.com/horizon3ai/CVE-2023-27350 | POC详情 |
| 4 | Exploit for Papercut CVE-2023-27350. [+] Reverse shell [+] Mass checking | https://github.com/adhikara13/CVE-2023-27350 | POC详情 |
| 5 | Perfom With Massive Authentication Bypass In PaperCut MF/NG | https://github.com/ThatNotEasy/CVE-2023-27350 | POC详情 |
| 6 | Python 2.7 | https://github.com/Jenderal92/CVE-2023-27350 | POC详情 |
| 7 | None | https://github.com/imancybersecurity/CVE-2023-27350-POC | POC详情 |
| 8 | None | https://github.com/ASG-CASTLE/CVE-2023-27350 | POC详情 |
| 9 | None | https://github.com/rasan2001/CVE-2023-27350 | POC详情 |
| 10 | None | https://github.com/rasan2001/CVE-2023-27350-Ongoing-Exploitation-of-PaperCut-Remote-Code-Execution-Vulnerability | POC详情 |
| 11 | Unauthenticated remote command execution in Papercut service allows an attacker to execute commands due to improper access controls in the SetupCompleted Java class. | https://github.com/monke443/CVE-2023-27350 | POC详情 |
| 12 | This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-27350.yaml | POC详情 |
| 13 | PoC for CVE-2023-27350 | https://github.com/0xB0y426/CVE-2023-27350-PoC | POC详情 |
| 14 | Papercut Vulnerability, Affected Versions are PaperCut MF or NG version 8.0 or later (excluding patched versions) on all OS platforms. | https://github.com/Royall-Researchers/CVE-2023-27350 | POC详情 |
| 15 | PaperCut NG/MG Authentication Bypass and Remote Code Execution (RCE) Exploit Tool. A standalone Bash implementation of the PaperCut exploit chain, featuring optional proxy support, automated session elevation, and dynamic command injection via the print scripting engine. Designed for security auditing and authorized penetration testing. | https://github.com/dezso-dfield/CVE-2023-27350 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论