Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | The (WordPress) website test script can be exploited for Unlimited File Upload via CVE-2020-35489 | https://github.com/dn9uy3n/Check-WP-CVE-2020-35489 | POC Details |
| 2 | None | https://github.com/X0UCYB3R/Check-WP-CVE-2020-35489 | POC Details |
| 3 | WordPress Sites Vulnerability Checker for CVE-2020-35489 | https://github.com/reneoliveirajr/wp_CVE-2020-35489_checker | POC Details |
| 4 | WordPress Contact Form 7 - Unrestricted File Upload | https://github.com/Cappricio-Securities/CVE-2020-35489 | POC Details |
| 5 | Harnessing AI to hack the limits of possibility | https://github.com/aifuzzer/poc-CVE-2020-35489 | POC Details |
| 6 | POC for RCE with CVE-2020-35489 | https://github.com/aitech66/poc-CVE-2020-35489 | POC Details |
| 7 | poc-CVE-2020-35489 | https://github.com/g1thubb002/poc-CVE-2020-35489 | POC Details |
| 8 | poc-CVE-2020-35489 | https://github.com/gh202503/poc-cve-2020-35489 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet