Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Unknown | Perfect Survey | 1.5.2 ~ 1.5.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-24762.yaml | POC Details |
| 2 | This repo shows an exploit to CVE-2021-24762. This is an Blind SQLi exploit that, on default config, greps the admin password. | https://github.com/c4cnm/Exploit_CVE-2021-24762 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet