Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container | https://github.com/opsxcq/exploit-CVE-2016-10033 | POC Details |
| 2 | Prevent PHP vulnerabilities similar to CVE-2016-10033 and CVE-2016-10045. | https://github.com/Zenexer/safeshell | POC Details |
| 3 | RCE against WordPress 4.6; Python port of https://exploitbox.io/vuln/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.html | https://github.com/GeneralTesler/CVE-2016-10033 | POC Details |
| 4 | Code and vulnerable WordPress container for exploiting CVE-2016-10033 | https://github.com/chipironcin/CVE-2016-10033 | POC Details |
| 5 | WordPress 4.6 - Remote Code Execution (RCE) PoC Exploit | https://github.com/Bajunan/CVE-2016-10033 | POC Details |
| 6 | None | https://github.com/qwertyuiop12138/CVE-2016-10033 | POC Details |
| 7 | None | https://github.com/liusec/WP-CVE-2016-10033 | POC Details |
| 8 | Exploits CVE-2016-10033 and CVE-2016-10045 | https://github.com/pedro823/cve-2016-10033-45 | POC Details |
| 9 | To solve CTFS.me problem | https://github.com/awidardi/opsxcq-cve-2016-10033 | POC Details |
| 10 | PHPMailer < 5.2.18 Remote Code Execution Exploit | https://github.com/0x00-0x00/CVE-2016-10033 | POC Details |
| 11 | cve-2016-10033 | https://github.com/cved-sources/cve-2016-10033 | POC Details |
| 12 | Remote Code Execution vulnerability in PHPMailer. | https://github.com/j4k0m/CVE-2016-10033 | POC Details |
| 13 | PHPMailer < 5.2.18 Remote Code Execution | https://github.com/zeeshanbhattined/exploit-CVE-2016-10033 | POC Details |
| 14 | wordpress docker | https://github.com/CAOlvchonger/CVE-2016-10033 | POC Details |
| 15 | CTF based around CVE-2016-10033 | https://github.com/eb613819/CTF_CVE-2016-10033 | POC Details |
| 16 | CVE-2016-10033 Wordpress 4.6 Exploit | https://github.com/ElnurBDa/CVE-2016-10033 | POC Details |
| 17 | Proof Of Concept for the CVE-2016-10033 (PHPMailer) | https://github.com/Astrowmist/POC-CVE-2016-10033 | POC Details |
| 18 | WordPress PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a " (backslash double quote) in a crafted Sender property in isMail transport. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2016/CVE-2016-10033.yaml | POC Details |
| 19 | None | https://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/Wordpress%204.6%20%E4%BB%BB%E6%84%8F%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20PwnScriptum.md | POC Details |
| 20 | A PoC of CVE-2016-10033 I made for PentesterLab | https://github.com/sealldeveloper/CVE-2016-10033-PoC | POC Details |
| 21 | None | https://github.com/alexander47777/CVE-2016-10033 | POC Details |
No public POC found.
Login to generate AI POCVovan Casino — портал в мир азартных приключений. Здесь каждый спин — шаг в неизведанное. Готовы к приключению? Vovan вход — и вперед к победам! Слоты, рулетка и покер ждут своего героя. Каждая награда — шаг вперёд в вашем путешествии к успеху. Состязания с крупными призами Мгновенные выплаты — заслуженные награды Мобильная версия для игры в пути Vovan Casino — казино для настоящих искателей приключений.