Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/gy741/CVE-2023-30258-setup | POC Details |
| 2 | None | https://github.com/sk00l/CVE-2023-30258 | POC Details |
| 3 | None | https://github.com/tinashelorenzi/CVE-2023-30258-magnus-billing-v7-exploit | POC Details |
| 4 | Command Injection vulnerability in MagnusSolution magnusbilling 6.x and 7.x allows remote attackers to run arbitrary commands via unauthenticated HTTP request. | https://github.com/Chocapikk/CVE-2023-30258 | POC Details |
| 5 | POC for CVE-2023-30258-RCE by n0o0b | https://github.com/n00o00b/CVE-2023-30258-RCE-POC | POC Details |
| 6 | Command Injection vulnerability in MagnusSolution magnusbilling 6.x and 7.x allows remote attackers to run arbitrary commands via unauthenticated HTTP request. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-30258.yaml | POC Details |
| 7 | A detailed walkthrough of TryHackMe's Billing room exploiting CVE-2023-30258 and escalating via fail2ban misconfig | https://github.com/AdityaBhatt3010/TryHackMe-Room-Walkthrough-Billing | POC Details |
| 8 | There are Exploit for Magnus Billing v7 system get root privilages | https://github.com/abdullohqurbon0v/CVE-2023-30258-Exploit-For-Magnus-Billing-System | POC Details |
| 9 | Billing CTF Machine_CVE-2023-30258_Remote Code Execution | https://github.com/CankunWang/Tryhackme_Billing | POC Details |
| 10 | RCE vuln in magnus billing php resource | https://github.com/kayl22/magnus_billing_7.3.0_RCE_CVE-2023-30258 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet