尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/drone789/CVE-2012-1823 | POC详情 |
| 2 | First script, pgp-cgi-cve-2012-1823 BASH script | https://github.com/tardummy01/oscp_scripts-1 | POC详情 |
| 3 | PHP-CGI-REMOTE_CVE-2012-1823, UnrealIRCd, MySQL, PostgreSQL and SSH bruteforce, VSFTPD2.3.4, samba CVE-2007-2447, JAVA RMI Server, distcc daemon, misconfigured NFS files, etc. | https://github.com/Unix13/metasploitable2 | POC详情 |
| 4 | None | https://github.com/cyberharsh/PHP_CVE-2012-1823 | POC详情 |
| 5 | PHP CGI Argument Injection RCE | https://github.com/theykillmeslowly/CVE-2012-1823 | POC详情 |
| 6 | PHP CGI Argument Injection. | https://github.com/0xl0k1/CVE-2012-1823 | POC详情 |
| 7 | Prova de conceito para PHP CGI Argument Injection (CVE-2012-1823) | https://github.com/Fatalitysec/CVE-2012-1823 | POC详情 |
| 8 | Prova de conceito de PHP CGI Argument Injection. | https://github.com/Fatalityx84/CVE-2012-1823 | POC详情 |
| 9 | Prova de conceito de php cgi argument injection | https://github.com/0xFatality/CVE-2012-1823 | POC详情 |
| 10 | None | https://github.com/Jimmy01240397/CVE-2012-1823-Analyze | POC详情 |
| 11 | CVE-2012-1823 exploit for https user password website. | https://github.com/JasonHobs/CVE-2012-1823-exploit-for-https-user-password-web | POC详情 |
| 12 | sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2012/CVE-2012-1823.yaml | POC详情 |
| 13 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/php-cgi-cve-2012-1823.yml | POC详情 |
| 14 | https://github.com/vulhub/vulhub/blob/master/php/CVE-2012-1823/README.md | POC详情 | |
| 15 | CVE-2012-1823 exploit for https user password website. | https://github.com/Dmitri131313/CVE-2012-1823-exploit-for-https-user-password-web | POC详情 |
| 16 | Ushbu videoda Kali Linux orqali Metasploitable 2 serveriga PHP CGI Argument Injection (CVE-2012-1823) ekspluatatsiyasi Metasploit yordamida amalga oshiriladi | https://github.com/nulltrace1336/PHP-CGI-Argument-Injection-Exploit | POC详情 |
| 17 | Automated Web Vulnerability Assessment of DVWA using OWASP ZAP to identify and analyze critical security flaws like Remote Code Execution (CVE-2012-1823). | https://github.com/waburig/Open-Worldwide-Application-Security-Project-OWASP- | POC详情 |
| 18 | A hands-on project demonstrating the setup of virtual security lab, network reconnaissance, and exploitation of CVE-2012-1823. | https://github.com/hackherMind-Pixel/Vulnerable-Lab-Exploitation | POC详情 |
未找到公开 POC。
登录以生成 AI POC| CVE-2012-0656 | Apple Mac OS X ‘LoginUIFramework’ 竞争条件漏洞 | |
| CVE-2012-0676 | Apple Safari ‘WebKit’ 输入验证漏洞 | |
| CVE-2012-0675 | Apple Mac OS X ‘Time Machine’ 授权问题漏洞 | |
| CVE-2012-0662 | Apple Mac OS X ‘Security Framework’ 整数溢出漏洞 | |
| CVE-2012-0661 | Apple Mac OS X ‘QuickTime’ 释放后使用漏洞 | |
| CVE-2012-0660 | Apple Mac OS X ‘QuickTime’ 缓冲区溢出漏洞 | |
| CVE-2012-0659 | Apple Mac OS X ‘QuickTime’ 整数溢出漏洞 | |
| CVE-2012-0658 | Apple Mac OS X ‘QuickTime’ 缓冲区溢出漏洞 | |
| CVE-2012-0657 | Apple Mac OS X ‘Quartz Composer’ 权限许可和访问控制漏洞 | |
| CVE-2012-2311 | PHP SQL注入漏洞 | |
| CVE-2012-0655 | Apple Mac OS X ‘libsecurity’ 加密问题漏洞 | |
| CVE-2012-0654 | Apple Mac OS X ‘libsecurity’ 缓冲区溢出漏洞 | |
| CVE-2012-0652 | Apple Mac OS X ‘Login Window’ 信息泄露漏洞 | |
| CVE-2012-0651 | Apple Mac OS X ‘Directory Service’ 信息泄露漏洞 | |
| CVE-2012-0649 | Apple Mac OS X ‘blued’ 竞争条件漏洞 | |
| CVE-2012-2336 | PHP 输入验证错误漏洞 | |
| CVE-2012-2335 | PHP ‘php-wrapper.fcgi’ 权限许可和访问控制问题漏洞 | |
| CVE-2012-2329 | PHP ‘apache_request_headers’ 函数缓冲区溢出漏洞 |
暂无评论