尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| WordPress | wordpress-develop | >= 5.6.0, < 5.7.1 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | WordPress - Authenticated XXE (CVE-2021-29447) | https://github.com/motikan2010/CVE-2021-29447 | POC详情 |
| 2 | WordPress XXE vulnerability | https://github.com/Vulnmachines/wordpress_cve-2021-29447 | POC详情 |
| 3 | Wordpress XXE injection 구축 자동화 및 PoC | https://github.com/dnr6419/CVE-2021-29447 | POC详情 |
| 4 | None | https://github.com/AssassinUKG/CVE-2021-29447 | POC详情 |
| 5 | None | https://github.com/b-abderrahmane/CVE-2021-29447-POC | POC详情 |
| 6 | Arbitrary file read controller based on CVE-2021-29447 | https://github.com/elf1337/blind-xxe-controller-CVE-2021-29447 | POC详情 |
| 7 | Proof of Concept for CVE-2021-29447 written in Python | https://github.com/Val-Resh/CVE-2021-29447-POC | POC详情 |
| 8 | Exploit WordPress Media Library XML External Entity Injection (XXE) to exfiltrate files. | https://github.com/M3l0nPan/wordpress-cve-2021-29447 | POC详情 |
| 9 | None | https://github.com/mega8bit/exploit_cve-2021-29447 | POC详情 |
| 10 | A Golang program to automate the execution of CVE-2021-29447 | https://github.com/thomas-osgood/CVE-2021-29447 | POC详情 |
| 11 | None | https://github.com/Abdulazizalsewedy/CVE-2021-29447 | POC详情 |
| 12 | None | https://github.com/G01d3nW01f/CVE-2021-29447 | POC详情 |
| 13 | CVE-2021-29447 - Authenticated XXE Injection - WordPress < 5.7.1 & PHP > 8 | https://github.com/viardant/CVE-2021-29447 | POC详情 |
| 14 | A proof of concept exploit for a wordpress 5.6 media library vulnerability | https://github.com/0xRar/CVE-2021-29447-PoC | POC详情 |
| 15 | None | https://github.com/andyhsu024/CVE-2021-29447 | POC详情 |
| 16 | None | https://github.com/specializzazione-cyber-security/demo-CVE-2021-29447-lezione | POC详情 |
| 17 | PoC for CVE-2021-29447 | https://github.com/magicrc/CVE-2021-29447 | POC详情 |
| 18 | POC to exploit WordPress 5.6-5.7 (PHP 8+) Authenticated XXE Injection. | https://github.com/Tea-On/CVE-2021-29447-Authenticated-XXE-WordPress-5.6-5.7 | POC详情 |
| 19 | The objective is to conduct a full-scale security assessment of a WordPress-based web application, culminating in a complete server compromise. The assessment will focus on exploiting a specific, real-world vulnerability (CVE-2021-29447) to achieve initial access. | https://github.com/ArtemCyberLab/Project-Project-Chimera-Exploiting-a-Modern-WordPress-XXE-to-Pillage-Secrets- | POC详情 |
| 20 | A XXE payload generator | https://github.com/0xricksanchez/CVE-2021-29447 | POC详情 |
| 21 | This repo describes about cve-2021-29447 and a small script for exploiting automatically | https://github.com/davids52/cve-2021-29447_auto-script | POC详情 |
| 22 | None | https://github.com/rdana55/CVE-2021-29447-PoC | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论