mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
1.7 KiB
1.7 KiB
CVE-2023-34960
Description
A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name.
POC
Reference
Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Aituglo/CVE-2023-34960
- https://github.com/Jenderal92/CHAMILO-CVE-2023-34960
- https://github.com/Mantodkaz/CVE-2023-34960
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/MzzdToT/Chamilo__CVE-2023-34960_RCE
- https://github.com/MzzdToT/HAC_Bored_Writing
- https://github.com/Pari-Malam/CVE-2023-34960
- https://github.com/ThatNotEasy/CVE-2023-34960
- https://github.com/YongYe-Security/CVE-2023-34960
- https://github.com/YongYe-Security/Chamilo_CVE-2023-34960-EXP
- https://github.com/getdrive/PoC
- https://github.com/h00die-gr3y/Metasploit
- https://github.com/hheeyywweellccoommee/Chamilo__CVE-2023-34960_RCE-ouvuu
- https://github.com/iluaster/getdrive_PoC
- https://github.com/izj007/wechat
- https://github.com/laohuan12138/exp-collect
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/tucommenceapousser/CVE-2023-34960-ex
- https://github.com/whoami13apt/files2