Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache OFBiz | 0 ~ 18.12.11 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2023-51467 POC | https://github.com/JaneMandy/CVE-2023-51467 | POC Details |
| 2 | Apache OfBiz Auth Bypass Scanner for CVE-2023-51467 | https://github.com/Chocapikk/CVE-2023-51467 | POC Details |
| 3 | None | https://github.com/K3ysTr0K3R/CVE-2023-51467-EXPLOIT | POC Details |
| 4 | This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz. | https://github.com/jakabakos/Apache-OFBiz-Authentication-Bypass | POC Details |
| 5 | None | https://github.com/Subha-BOO7/Exploit_CVE-2023-51467 | POC Details |
| 6 | Apache Ofbiz CVE-2023-51467 图形化漏洞利用工具 | https://github.com/JaneMandy/CVE-2023-51467-Exploit | POC Details |
| 7 | A go-exploit for Apache OFBiz CVE-2023-51467 | https://github.com/vulncheck-oss/cve-2023-51467 | POC Details |
| 8 | Auto exploit script for the Java web framework OF Biz under CVE-2023-51467. | https://github.com/Jake123otte1/BadBizness | POC Details |
| 9 | Auto exploit script for the Java web framework OF Biz under CVE-2023-51467. | https://github.com/Jake123otte1/BadBizness-CVE-2023-51467 | POC Details |
| 10 | Apache OFBiz Authentication Bypass Vulnerability (CVE-2023-51467 and CVE-2023-49070) | https://github.com/pulentoski/CVE-2023-51467-and-CVE-2023-49070 | POC Details |
| 11 | Auto exploit script for the Java web framework OF Biz under CVE-2023-51467. | https://github.com/tw0point/BadBizness-CVE-2023-51467 | POC Details |
| 12 | 🚨 Just completed an incident report on Event ID 217: Apache OFBiz Auth Bypass and Code Injection 0-Day (CVE-2023-51467). This critical vulnerability allows attackers to bypass authentication and execute code remotely! Stay vigilant and ensure your systems are patched! Big thanks to LetsDefend.io for the platform to practice real-world scenarios. | https://github.com/AhmedMansour93/Event-ID-217-Rule-Name-SOC254-Apache-OFBiz-Auth-Bypass-and-Code-Injection-0Day-CVE-2023-51467- | POC Details |
| 13 | Auto exploit script for the Java web framework OF Biz under CVE-2023-51467. | https://github.com/2ptr/BadBizness-CVE-2023-51467 | POC Details |
| 14 | The vulnerability allows attackers to bypass authentication to achieve a simple Server-Side Request Forgery (SSRF) | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-51467.yaml | POC Details |
| 15 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Apache%20OfBiz%20%E9%89%B4%E6%9D%83%E7%BB%95%E8%BF%87%E5%AF%BC%E8%87%B4%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%20CVE-2023-51467.md | POC Details |
| 16 | https://github.com/vulhub/vulhub/blob/master/ofbiz/CVE-2023-51467/README.md | POC Details | |
| 17 | CVE-2023-51467 POC | https://github.com/ImuSpirit/CVE-2023-51467 | POC Details |
| 18 | Apache Ofbiz CVE-2023-51467 图形化漏洞利用工具 | https://github.com/ImuSpirit/CVE-2023-51467-Exploit | POC Details |
| 19 | Auto exploit script for the Java web framework OF Biz under CVE-2023-51467. | https://github.com/jakeotte/BadBizness-CVE-2023-51467 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet