Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC) | https://github.com/GeneralEG/CVE-2019-15858 | POC Details |
| 2 | Unauthenticated Remote Code Execution at Woody Ad Snippets (PoC) | https://github.com/orangmuda/CVE-2019-15858 | POC Details |
| 3 | WordPress Woody Ad Snippets prior to 2.2.5 is susceptible to cross-site scripting and remote code execution via admin/includes/class.import.snippet.php, which allows unauthenticated options import as demonstrated by storing a cross-site scripting payload for remote code execution. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-15858.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet