Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2016-10924 - Directory traversal vulnerability in WordPress ebook-download plugin(<1.2). PoC + PID Bruteforce in Python. | https://github.com/rvizx/CVE-2016-10924 | POC Details |
| 2 | None | https://github.com/LGenAgul/Wordpress-ebook-CVE-2016-10924 | POC Details |
| 3 | Proof-of-Concept (PoC) exploit script for the Directory Traversal vulnerability (CVE-2016-10924) found in the WordPress plugin ebook-download (versions < 1.2). This vulnerability allows unauthorized file reads via a crafted GET request. | https://github.com/808ale/cve-2016-10924-POC | POC Details |
| 4 | Wordpress Zedna eBook download prior to version 1.2 was affected by a filedownload.php local file inclusion vulnerability. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2016/CVE-2016-10924.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet