Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/NewLockBit/CVE-2023-3824-PHP-to-RCE-National-Crime-AgencyLEAK | POC Details |
| 2 | Research of CVE-2023-3824 (NCA - Lockbit) | https://github.com/NewLockBit/Research-of-CVE-2023-3824-NCA-Lockbit | POC Details |
| 3 | None | https://github.com/NewLockBit/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK | POC Details |
| 4 | Vulnerability in PHP Phar files, due to buffer overflow, arises from insufficient length checks on file names within the Phar archive. Malicious actors can craft Phar files with long file names, leading to buffer overflow and potential execution of malicious code or data leakage. This vulnerability can be exploited for code execution CVE-2023-3824 | https://github.com/jhonnybonny/CVE-2023-3824 | POC Details |
| 5 | None | https://github.com/StayBeautiful-collab/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK | POC Details |
| 6 | None | https://github.com/Nuki2u/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK | POC Details |
| 7 | CVE-2023-3824 | https://github.com/m1sn0w/CVE-2023-3824 | POC Details |
| 8 | None | https://github.com/o2vi1te/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK | POC Details |
| 9 | None | https://github.com/Nfttkcauzy/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK | POC Details |
| 10 | None | https://github.com/Starla2u/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK | POC Details |
| 11 | CVE-2023-3824 PoC | https://github.com/baesh3r/poc-CVE-2023-3824 | POC Details |
| 12 | PoC CVE 2023-3824 | https://github.com/fr33c0d3/poc-cve-2023-3824 | POC Details |
| 13 | poc-cve-2023-3824 | https://github.com/bluefish3r/poc-cve | POC Details |
| 14 | In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE. | https://github.com/exploitdevelop/CVE-2023-3824 | POC Details |
| 15 | None | https://github.com/dadosneurais/cve-2023-3824 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet