尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/NewLockBit/CVE-2023-3824-PHP-to-RCE-National-Crime-AgencyLEAK | POC详情 |
| 2 | Research of CVE-2023-3824 (NCA - Lockbit) | https://github.com/NewLockBit/Research-of-CVE-2023-3824-NCA-Lockbit | POC详情 |
| 3 | None | https://github.com/NewLockBit/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK | POC详情 |
| 4 | Vulnerability in PHP Phar files, due to buffer overflow, arises from insufficient length checks on file names within the Phar archive. Malicious actors can craft Phar files with long file names, leading to buffer overflow and potential execution of malicious code or data leakage. This vulnerability can be exploited for code execution CVE-2023-3824 | https://github.com/jhonnybonny/CVE-2023-3824 | POC详情 |
| 5 | None | https://github.com/StayBeautiful-collab/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK | POC详情 |
| 6 | None | https://github.com/Nuki2u/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK | POC详情 |
| 7 | CVE-2023-3824 | https://github.com/m1sn0w/CVE-2023-3824 | POC详情 |
| 8 | None | https://github.com/o2vi1te/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK | POC详情 |
| 9 | None | https://github.com/Nfttkcauzy/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK | POC详情 |
| 10 | None | https://github.com/Starla2u/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK | POC详情 |
| 11 | CVE-2023-3824 PoC | https://github.com/baesh3r/poc-CVE-2023-3824 | POC详情 |
| 12 | PoC CVE 2023-3824 | https://github.com/fr33c0d3/poc-cve-2023-3824 | POC详情 |
| 13 | poc-cve-2023-3824 | https://github.com/bluefish3r/poc-cve | POC详情 |
| 14 | In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE. | https://github.com/exploitdevelop/CVE-2023-3824 | POC详情 |
| 15 | None | https://github.com/dadosneurais/cve-2023-3824 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论