Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data. | https://github.com/Rubikcuv5/cve-2023-30253 | POC Details |
| 2 | Poc for CVE-2023-30253 | https://github.com/04Shivam/CVE-2023-30253-Exploit | POC Details |
| 3 | Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection | https://github.com/nikn0laty/Exploit-for-Dolibarr-17.0.0-CVE-2023-30253 | POC Details |
| 4 | CVE-2023-30253 PoC | https://github.com/g4nkd/CVE-2023-30253-PoC | POC Details |
| 5 | In Dolibarr 17.0.0 with the CMS Website plugin (core) enabled, an authenticated attacker can obtain remote command execution via php code injection bypassing the application restrictions. | https://github.com/dollarboysushil/Dolibarr-17.0.0-Exploit-CVE-2023-30253 | POC Details |
| 6 | An authenticated RCE exploit for Dolibarr ERP/CRM CVE-2023-30253. | https://github.com/andria-dev/DolibabyPhp | POC Details |
| 7 | Dolibarr 17.0.0 PHP Code Injection Exploit | https://github.com/bluetoothStrawberry/CVE-2023-30253 | POC Details |
| 8 | POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253) | https://github.com/1lkla/POC-exploit-for-Dolibarr | POC Details |
No public POC found.
Login to generate AI POCNo comments yet