Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Wordpress plugin Site-Editor v1.1.1 LFI exploit | https://github.com/0x00-0x00/CVE-2018-7422 | POC Details |
| 2 | Site Editor WordPress Plugin <= 1.1.1 Local File Inclusion Script | https://github.com/jessisec/CVE-2018-7422 | POC Details |
| 3 | Local File Inclusion in WordPress Plugin Site Editor 1.1.1 | https://github.com/JacobEbben/CVE-2018-7422 | POC Details |
| 4 | WordPress Site Editor through 1.1.1 allows remote attackers to retrieve arbitrary files via the ajax_path parameter to editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-7422.yaml | POC Details |
| 5 | Exploit for CVE-2018-7422: Local File Inclusion in WordPress Plugin Site Editor 1.1.1 [T1574.008] | https://github.com/ndr-repo/CVE-2018-7422 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet