尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | https://medium.com/@mansoorr/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8 | https://github.com/mansoorr123/wp-file-manager-CVE-2020-25213 | POC详情 |
| 2 | CVE-2020-25213 Wordpress File Manager 6.7 Plugin 0day exploit | https://github.com/kakamband/WPKiller | POC详情 |
| 3 | None | https://github.com/forse01/CVE-2020-25213-Wordpress | POC详情 |
| 4 | Will write a python script for exploiting this vulnerability | https://github.com/0000000O0Oo/Wordpress-CVE-2020-25213 | POC详情 |
| 5 | None | https://github.com/piruprohacking/CVE-2020-25213 | POC详情 |
| 6 | None | https://github.com/b1ackros337/CVE-2020-25213 | POC详情 |
| 7 | Python exploit for RCE in Wordpress | https://github.com/BLY-Coder/Python-exploit-CVE-2020-25213 | POC详情 |
| 8 | Python Interactive Exploit for WP File Manager Vulnerability. The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. | https://github.com/E1tex/Python-CVE-2020-25213 | POC详情 |
| 9 | None | https://github.com/Nguyen-id/CVE-2020-25213 | POC详情 |
| 10 | The WordPress File Manager plugin prior to version 6.9 is susceptible to remote code execution. The vulnerability allows unauthenticated remote attackers to upload .php files. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-25213.yaml | POC详情 |
| 11 | None | https://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/WordPress%20File%20Manager%EF%BC%9C6.9%20RCE%20CVE-2020-25213.md | POC详情 |
暂无评论