Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2019-9978 - RCE on a Wordpress plugin: Social Warfare < 3.5.3 | https://github.com/mpgn/CVE-2019-9978 | POC Details |
| 2 | CVE-2019-9978 - (PoC) RCE in Social WarFare Plugin (<=3.5.2) | https://github.com/hash3liZer/CVE-2019-9978 | POC Details |
| 3 | Wordpress Social Warfare Remote Code Execution (AUTO UPLOAD SHELL) | https://github.com/KTN1990/CVE-2019-9978 | POC Details |
| 4 | cve-2019-9978 | https://github.com/cved-sources/cve-2019-9978 | POC Details |
| 5 | Social WarFare Plugin (<=3.5.2) Remote Code Execution | https://github.com/d3fudd/CVE-2019-9978_Exploit | POC Details |
| 6 | Remote Code Execution in Social Warfare Plugin before 3.5.3 for Wordpress. | https://github.com/grimlockx/CVE-2019-9978 | POC Details |
| 7 | python3 version of the CVE-2019-9978 exploit | https://github.com/h8handles/CVE-2019-9978-Python3 | POC Details |
| 8 | None | https://github.com/20dani09/CVE-2019-9978 | POC Details |
| 9 | cve-2019-9978 PoC | https://github.com/0xMoonrise/cve-2019-9978 | POC Details |
| 10 | None | https://github.com/MAHajian/CVE-2019-9978 | POC Details |
| 11 | A Remote Code Execution (RCE) vulnerability in the Social Warfare plugin for WordPress, affecting versions below 3.5.3. | https://github.com/echoosso/CVE-2019-9978 | POC Details |
| 12 | WordPress Social Warfare plugin before 3.5.3 contains a cross-site scripting vulnerability via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, affecting Social Warfare and Social Warfare Pro. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-9978.yaml | POC Details |
| 13 | The `swp_debug` parameter in `admin-post.php` allows remote attackers to include external files containing malicious PHP code, which are evaluated on the server. By supplying a crafted URL that hosts a reverse shell payload, an attacker can gain command execution. | https://github.com/Housma/CVE-2019-9978-Social-Warfare-WordPress-Plugin-RCE | POC Details |
| 14 | payload txt | https://github.com/xxoprt/payloadCVE-2019-9978 | POC Details |
| 15 | A custom Python proof-of-concept showcasing root-cause analysis and exploitation of CVE 2019-9978 (Social Warfare plugin),focusing on practical RFI to RCE attack flow. | https://github.com/Vaidehim55/CVE-2019-9978-RCE-PoC | POC Details |
| 16 | POC (RCE) -> CVE-2019-9978 | https://github.com/yup-Ivan/CVE-2019-9978 | POC Details |
No public POC found.
Login to generate AI POCVenture into the epic sandbox of EVE Online. Shape your destiny today. Conquer alongside millions of pilots worldwide. <a href=https://www.eveonline.com/signup?invc=46758c20-63e3-4816-aa0e-f91cff26ade4>Download free</a>
Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.