Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A simple python script to check if a service is vulnerable | https://github.com/MaanVader/CVE-2023-27350-POC | POC Details |
| 2 | None | https://github.com/0ximan1337/CVE-2023-27350-POC | POC Details |
| 3 | Proof of Concept Exploit for PaperCut CVE-2023-27350 | https://github.com/horizon3ai/CVE-2023-27350 | POC Details |
| 4 | Exploit for Papercut CVE-2023-27350. [+] Reverse shell [+] Mass checking | https://github.com/adhikara13/CVE-2023-27350 | POC Details |
| 5 | Perfom With Massive Authentication Bypass In PaperCut MF/NG | https://github.com/ThatNotEasy/CVE-2023-27350 | POC Details |
| 6 | Python 2.7 | https://github.com/Jenderal92/CVE-2023-27350 | POC Details |
| 7 | None | https://github.com/imancybersecurity/CVE-2023-27350-POC | POC Details |
| 8 | None | https://github.com/ASG-CASTLE/CVE-2023-27350 | POC Details |
| 9 | None | https://github.com/rasan2001/CVE-2023-27350 | POC Details |
| 10 | None | https://github.com/rasan2001/CVE-2023-27350-Ongoing-Exploitation-of-PaperCut-Remote-Code-Execution-Vulnerability | POC Details |
| 11 | Unauthenticated remote command execution in Papercut service allows an attacker to execute commands due to improper access controls in the SetupCompleted Java class. | https://github.com/monke443/CVE-2023-27350 | POC Details |
| 12 | This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-27350.yaml | POC Details |
| 13 | PoC for CVE-2023-27350 | https://github.com/0xB0y426/CVE-2023-27350-PoC | POC Details |
| 14 | Papercut Vulnerability, Affected Versions are PaperCut MF or NG version 8.0 or later (excluding patched versions) on all OS platforms. | https://github.com/Royall-Researchers/CVE-2023-27350 | POC Details |
| 15 | PaperCut NG/MG Authentication Bypass and Remote Code Execution (RCE) Exploit Tool. A standalone Bash implementation of the PaperCut exploit chain, featuring optional proxy support, automated session elevation, and dynamic command injection via the print scripting engine. Designed for security auditing and authorized penetration testing. | https://github.com/dezso-dfield/CVE-2023-27350 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet