高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | CVE-2023-41892 - Craft CMS Remote Code Execution (RCE) | https://github.com/zaenhaxor/CVE-2023-41892 | POC詳細 |
| 2 | Exploit for CVE-2023-41892 | https://github.com/Faelian/CraftCMS_CVE-2023-41892 | POC詳細 |
| 3 | CVE-2023-41892 Reverse Shell | https://github.com/diegaccio/Craft-CMS-Exploit | POC詳細 |
| 4 | A Craft CMS vulnerability that allows Remote Code Execution (RCE). | https://github.com/acesoyeo/CVE-2023-41892 | POC詳細 |
| 5 | Exploit for CVE-2023-41892 | https://github.com/0xfalafel/CraftCMS_CVE-2023-41892 | POC詳細 |
| 6 | None | https://github.com/CERTologists/HTTP-Request-for-PHP-object-injection-attack-on-CVE-2023-41892 | POC詳細 |
| 7 | Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector leading to Remote Code Execution (RCE). Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-41892.yaml | POC詳細 |
| 8 | None | https://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/CraftCMS%20%E6%9C%AA%E6%8E%88%E6%9D%83%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2023-41892.md | POC詳細 |
| 9 | https://github.com/vulhub/vulhub/blob/master/craftcms/CVE-2023-41892/README.md | POC詳細 | |
| 10 | Customized this for my own use | https://github.com/user01-1/CVE-2023-41892_poc | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成katana