Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploit for CVE-2023-35813 POC | https://github.com/lexy-1/CVE-2023-35813 | POC Details |
| 2 | Exploit for CVE-2023-35813 POC | https://github.com/aalexpereira/CVE-2023-35813 | POC Details |
| 3 | An exploit for the Sitecore Remote Code Execution Vulnerability | https://github.com/BagheeraAltered/CVE-2023-35813-PoC | POC Details |
| 4 | Multiple Sitecore products allow remote code execution. This affects Experience Manager, Experience Platform, and Experience Commerce through 10.3. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-35813.yaml | POC Details |
| 5 | CVE-2023-35813 is a proof-of-concept used to determine if an instance of Sitecore is vulnerable by analyzing a server Response Header for modification. | https://github.com/her3ticAVI/CVE-2023-35813 | POC Details |
| 6 | Exploit CVE-2023-35813 PoC Script | https://github.com/Rezy-Dev/CVE-2023-35813 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet