Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | This Python script is designed to exploit a security vulnerability in Bitrix24, leading to a Denial of Service (DoS) attack. The vulnerability, identified as CVE-2023-1718, allows an attacker to disrupt the normal operation of a Bitrix24 instance. | https://github.com/jhonnybonny/Bitrix24DoS | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-1720 | 9.6 CRITICAL | Bitrix24 Stored Cross-Site Scripting (XSS) via File Upload |
| CVE-2023-1717 | 9.6 CRITICAL | Bitrix24 Cross-Site Scripting (XSS) via Client-side Prototype Pollution |
| CVE-2023-1716 | 9.0 CRITICAL | Bitrix24 Stored Cross-Site Scripting (XSS) via Improper Input Neutralization on Invoice Ed |
| CVE-2023-1715 | 9.0 CRITICAL | Bitrix24 Stored Cross-Site Scripting (XSS) via Improper Input Neutralization on Invoice Ed |
| CVE-2023-1714 | 8.8 HIGH | Bitrix24 Remote Command Execution (RCE) via Unsafe Variable Extraction |
| CVE-2023-1713 | 8.8 HIGH | Bitrix24 Remote Command Execution (RCE) via Insecure Temporary File Creation |
| CVE-2023-1719 | 7.5 HIGH | Bitrix24 Insecure Global Variable Extraction |
No comments yet