尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| OpenPrinting | cups-browsed | <= 2.0.1 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | POC scanner for CVE-2024-47176 | https://github.com/GO0dspeed/spill | POC详情 |
| 2 | CUPS Browsd Check_CVE-2024-47176 | https://github.com/workabhiwin09/CVE-2024-47176 | POC详情 |
| 3 | Scanner for the CUPS vulnerability CVE-2024-47176 | https://github.com/tonyarris/CVE-2024-47176-Scanner | POC详情 |
| 4 | Scanner | https://github.com/mr-r3b00t/CVE-2024-47176 | POC详情 |
| 5 | Vulnerability Scanner for CUPS: CVE-2024-47176 | https://github.com/aytackalinci/CVE-2024-47176 | POC详情 |
| 6 | A simple CVE-2024-47176 (cups_browsed) check tool written in go. | https://github.com/nma-io/CVE-2024-47176 | POC详情 |
| 7 | None | https://github.com/pearlmansara/CVE-2024-47176-CUPS | POC详情 |
| 8 | Unauthenticated RCE on cups-browsed (exploit and nuclei template) | https://github.com/l0n3m4n/CVE-2024-47176 | POC详情 |
| 9 | None | https://github.com/gumerzzzindo/CVE-2024-47176 | POC详情 |
| 10 | A simple scanner for identifying vulnerable cups-browsed instances on your network | https://github.com/MalwareTech/CVE-2024-47176-Scanner | POC详情 |
| 11 | This repository contains a scanner for detecting vulnerabilities in the cups-browsed service of CUPS (Common Unix Printing System). The vulnerability CVE-2024-47176 allows a remote attacker to exploit an insecure configuration of the daemon, potentially leading to arbitrary code execution. | https://github.com/AxthonyV/CVE-2024-47176 | POC详情 |
| 12 | A Mass Scanner designed to detect the CVE-2024-47176 vulnerability across systems running the Common Unix Printing System (CUPS). | https://github.com/gianlu335/CUPS-CVE-2024-47176 | POC详情 |
| 13 | A Mass Scanner designed to detect the CVE-2024-47176 vulnerability across systems running the Common Unix Printing System (CUPS). | https://github.com/gianlu111/CUPS-CVE-2024-47176 | POC详情 |
| 14 | Unix CUPS打印系统 远程代码执行漏洞 | https://github.com/0x7556/CVE-2024-47176 | POC详情 |
| 15 | CUPS is a standards-based, open-source printing system, and cups-browsed contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. cups-browsed binds to INADDR_ANY-631, causing it to trust any packet from any source, and can cause the Get-Printer-Attributes IPP request to an attacker controlled URL. Due to the service binding to *-631 ( INADDR_ANY ), multiple bugs in cups-browsed can be exploited in sequence to introduce a malicious printer to the system. This chain of exploits ultimately enables an attacker to execute arbitrary commands remotely on the target machine without authentication when a print job is started. This poses a significant security risk over the network. Notably, this vulnerability is particularly concerning as it can be exploited from the public internet, potentially exposing a vast number of systems to remote attacks if their CUPS services are enabled. | https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2024/CVE-2024-47176.yaml | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论