尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/happynote3966/CVE-2014-3704 | POC详情 |
| 2 | CVE-2014-3704 aka Drupalgeddon - Form-Cache Injection Method | https://github.com/AleDiBen/Drupalgeddon | POC详情 |
| 3 | An rewritten POC on the CVE-2014-3704 | https://github.com/RasmusKnothNielsen/Drupalgeddon-Python3 | POC详情 |
| 4 | An rewritten POC on the CVE-2014-3704 | https://github.com/Neldeborg/Drupalgeddon-Python3 | POC详情 |
| 5 | This code is taken from "Drupal 7.0 < 7.31 - 'Drupalgeddon' SQL Injection (Add Admin User)" and was converted to Python 3 to suit the exercise in Academy for Module "Attacking Commoon Applications" and section "Attacking Drupal". | https://github.com/joaomorenorf/CVE-2014-3704 | POC详情 |
| 6 | The expandArguments function in the database abstraction API in Drupal core 7.x before 7.32 does not properly construct prepared statements, which allows remote attackers to conduct SQL injection attacks via an array containing specially crafted keys. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2014/CVE-2014-3704.yaml | POC详情 |
| 7 | None | https://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/Drupal%20%207.32%20%E2%80%9CDrupalgeddon%E2%80%9D%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%20CVE-2014-3704.md | POC详情 |
| 8 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/drupal-cve-2014-3704-sqli.yml | POC详情 |
| 9 | https://github.com/vulhub/vulhub/blob/master/drupal/CVE-2014-3704/README.md | POC详情 | |
| 10 | Audit de sécurité Black Box d'un serveur Drupal 7. Démonstration d'une Kill Chain complète : Injection SQL (CVE-2014-3704) ➔ RCE ➔ Reverse Shell ➔ Escalade vers Root (SUID). Ce dépôt contient le rapport technique détaillé, les preuves d'exploitation (PoC) et les mesures de remédiation pour sécuriser l'infrastructure. | https://github.com/fbm31/Audit-BlackBox-Web-to-Root | POC详情 |
未找到公开 POC。
登录以生成 AI POCZaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.