尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data. | https://github.com/Rubikcuv5/cve-2023-30253 | POC详情 |
| 2 | Poc for CVE-2023-30253 | https://github.com/04Shivam/CVE-2023-30253-Exploit | POC详情 |
| 3 | Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection | https://github.com/nikn0laty/Exploit-for-Dolibarr-17.0.0-CVE-2023-30253 | POC详情 |
| 4 | CVE-2023-30253 PoC | https://github.com/g4nkd/CVE-2023-30253-PoC | POC详情 |
| 5 | In Dolibarr 17.0.0 with the CMS Website plugin (core) enabled, an authenticated attacker can obtain remote command execution via php code injection bypassing the application restrictions. | https://github.com/dollarboysushil/Dolibarr-17.0.0-Exploit-CVE-2023-30253 | POC详情 |
| 6 | An authenticated RCE exploit for Dolibarr ERP/CRM CVE-2023-30253. | https://github.com/andria-dev/DolibabyPhp | POC详情 |
| 7 | Dolibarr 17.0.0 PHP Code Injection Exploit | https://github.com/bluetoothStrawberry/CVE-2023-30253 | POC详情 |
| 8 | POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253) | https://github.com/1lkla/POC-exploit-for-Dolibarr | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论