Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/happynote3966/CVE-2014-3704 | POC Details |
| 2 | CVE-2014-3704 aka Drupalgeddon - Form-Cache Injection Method | https://github.com/AleDiBen/Drupalgeddon | POC Details |
| 3 | An rewritten POC on the CVE-2014-3704 | https://github.com/RasmusKnothNielsen/Drupalgeddon-Python3 | POC Details |
| 4 | An rewritten POC on the CVE-2014-3704 | https://github.com/Neldeborg/Drupalgeddon-Python3 | POC Details |
| 5 | This code is taken from "Drupal 7.0 < 7.31 - 'Drupalgeddon' SQL Injection (Add Admin User)" and was converted to Python 3 to suit the exercise in Academy for Module "Attacking Commoon Applications" and section "Attacking Drupal". | https://github.com/joaomorenorf/CVE-2014-3704 | POC Details |
| 6 | The expandArguments function in the database abstraction API in Drupal core 7.x before 7.32 does not properly construct prepared statements, which allows remote attackers to conduct SQL injection attacks via an array containing specially crafted keys. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2014/CVE-2014-3704.yaml | POC Details |
| 7 | None | https://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/Drupal%20%207.32%20%E2%80%9CDrupalgeddon%E2%80%9D%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%20CVE-2014-3704.md | POC Details |
| 8 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/drupal-cve-2014-3704-sqli.yml | POC Details |
| 9 | https://github.com/vulhub/vulhub/blob/master/drupal/CVE-2014-3704/README.md | POC Details | |
| 10 | Audit de sécurité Black Box d'un serveur Drupal 7. Démonstration d'une Kill Chain complète : Injection SQL (CVE-2014-3704) ➔ RCE ➔ Reverse Shell ➔ Escalade vers Root (SUID). Ce dépôt contient le rapport technique détaillé, les preuves d'exploitation (PoC) et les mesures de remédiation pour sécuriser l'infrastructure. | https://github.com/fbm31/Audit-BlackBox-Web-to-Root | POC Details |
No public POC found.
Login to generate AI POCZaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.