Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploit of CVE-2019-8942 and CVE-2019-8943 | https://github.com/v0lck3r/CVE-2019-8943 | POC Details |
| 2 | CVE-2019-8943 WordPress Crop-Image | https://github.com/hadrian3689/wordpress_cropimage | POC Details |
| 3 | Exploit of CVE-2019-8942 and CVE-2019-8943 | https://github.com/oussama-rahali/CVE-2019-8943 | POC Details |
| 4 | WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-8943.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet