Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2023-34960 Chamilo PoC | https://github.com/Aituglo/CVE-2023-34960 | POC Details |
| 2 | Python 2.7 | https://github.com/Jenderal92/CHAMILO-CVE-2023-34960 | POC Details |
| 3 | None | https://github.com/YongYe-Security/Chamilo_CVE-2023-34960-EXP | POC Details |
| 4 | Perform with Massive Command Injection (Chamilo) | https://github.com/ThatNotEasy/CVE-2023-34960 | POC Details |
| 5 | None | https://github.com/Mantodkaz/CVE-2023-34960 | POC Details |
| 6 | Perform with Massive Command Injection (Chamilo) | https://github.com/tucommenceapousser/CVE-2023-34960-ex | POC Details |
| 7 | Chamilo CVE-2023-34960 Batch scan/exploit | https://github.com/YongYe-Security/CVE-2023-34960 | POC Details |
| 8 | Automatic vuln scanner and exploiter for l7 ddos attacks using Chamilio CVE-2023-34960 | https://github.com/dvtarsoul/ChExp | POC Details |
| 9 | chamilo soap api rce (/webservices/additional_webservices.php) | https://github.com/mr-won/cve-2023-34960 | POC Details |
| 10 | A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-34960.yaml | POC Details |
| 11 | chamilo soap api rce (/webservices/additional_webservices.php) | https://github.com/user20252228/cve-2023-34960 | POC Details |
| 12 | chamilo soap api rce (/webservices/additional_webservices.php) | https://github.com/tpdlshdmlrkfmcla/cve-2023-34960 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet