Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2023-34960 Chamilo PoC | https://github.com/Aituglo/CVE-2023-34960 | POC Details |
| 2 | Python 2.7 | https://github.com/Jenderal92/CHAMILO-CVE-2023-34960 | POC Details |
| 3 | None | https://github.com/YongYe-Security/Chamilo_CVE-2023-34960-EXP | POC Details |
| 4 | Perform with Massive Command Injection (Chamilo) | https://github.com/ThatNotEasy/CVE-2023-34960 | POC Details |
| 5 | None | https://github.com/Mantodkaz/CVE-2023-34960 | POC Details |
| 6 | Perform with Massive Command Injection (Chamilo) | https://github.com/tucommenceapousser/CVE-2023-34960-ex | POC Details |
| 7 | Chamilo CVE-2023-34960 Batch scan/exploit | https://github.com/YongYe-Security/CVE-2023-34960 | POC Details |
| 8 | Automatic vuln scanner and exploiter for l7 ddos attacks using Chamilio CVE-2023-34960 | https://github.com/dvtarsoul/ChExp | POC Details |
| 9 | chamilo soap api rce (/webservices/additional_webservices.php) | https://github.com/mr-won/cve-2023-34960 | POC Details |
| 10 | A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-34960.yaml | POC Details |
| 11 | chamilo soap api rce (/webservices/additional_webservices.php) | https://github.com/user20252228/cve-2023-34960 | POC Details |
| 12 | chamilo soap api rce (/webservices/additional_webservices.php) | https://github.com/tpdlshdmlrkfmcla/cve-2023-34960 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-33493 | 9.8 CRITICAL | PrestaShop 代码问题漏洞 |
| CVE-2023-26139 | 7.5 HIGH | underscore-keypath 安全漏洞 |
| CVE-2023-39147 | Uvdesk 代码问题漏洞 | |
| CVE-2023-36984 | Lavalite CMS 安全漏洞 | |
| CVE-2023-36121 | e107 跨站脚本漏洞 | |
| CVE-2023-38990 | Jeesite 安全漏洞 | |
| CVE-2023-33560 | PHPJabbers Time Slots Booking Calendar 跨站脚本漏洞 | |
| CVE-2023-33561 | PHPJabbers Time Slots Booking Calendar 安全漏洞 | |
| CVE-2023-33562 | PHPJabbers Time Slots Booking Calendar 安全漏洞 | |
| CVE-2023-33563 | PHPJabbers Time Slots Booking Calendar 授权问题漏洞 | |
| CVE-2023-33564 | PHPJabbers Time Slots Booking Calendar 跨站脚本漏洞 | |
| CVE-2023-34869 | PHPJabbers Time Slots Booking Calendar 跨站脚本漏洞 | |
| CVE-2023-36118 | Faculty Evaulation System 跨站脚本漏洞 | |
| CVE-2023-36351 | Viatom Health ViHealth 安全漏洞 | |
| CVE-2023-34551 | EZVIZ CS Series 缓冲区错误漏洞 | |
| CVE-2023-34552 | EZVIZ CS Series 缓冲区错误漏洞 | |
| CVE-2020-10962 | PowerShell App Deployment Toolkit 安全漏洞 | |
| CVE-2023-36983 | Lavalite CMS 安全漏洞 | |
| CVE-2023-36210 | MotoCMS 注入漏洞 | |
| CVE-2023-36211 | Barebones CMS 跨站脚本漏洞 |
Showing top 20 of 30 CVEs. View all on vendor page → →
No comments yet