尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| migrate | Backup Migration | * ~ 1.3.7 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution | https://github.com/Chocapikk/CVE-2023-6553 | POC详情 |
| 2 | None | https://github.com/motikan2010/CVE-2023-6553-PoC | POC详情 |
| 3 | None | https://github.com/kiddenta/CVE-2023-6553 | POC详情 |
| 4 | None | https://github.com/julienbrs/exploit-CVE-2023-6553 | POC详情 |
| 5 | CVE-2023-6553 exploit script | https://github.com/cc3305/CVE-2023-6553 | POC详情 |
| 6 | Exploit Development for CVE-2023-6553 on Backup Plugin in Wordpress | https://github.com/Harshit-Mashru/CVE-2023-6553 | POC详情 |
| 7 | The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated threat actors to easily execute code on the server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-6553.yaml | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论