Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/darkpills/CVE-2021-25094-tatsu-preauth-rce | POC Details |
| 2 | GILANG - Exploiter for CVE-2021-25094 | https://github.com/TUANB4DUT/typehub-exploiter | POC Details |
| 3 | Tatsu Plugin ZIP File add_custom_font unrestricted upload | https://github.com/xdx57/CVE-2021-25094 | POC Details |
| 4 | This script exploits a vulnerability (CVE-2021-25094) in the TypeHub WordPress plugin. | https://github.com/experimentalcrow1/TypeHub-Exploiter | POC Details |
| 5 | An unrestricted file upload in WordPress Tatsubuilder plugin version <= 3.3.11 enables an unauthenticated attacker to perform a remote code execution (RCE) on the server host due to multiple weaknesses in the font import feature and put 100,000 websites at risk. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-25094.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet