Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A Directory Traversal attack (also known as path traversal) aims to access files and directories that are stored outside the intended folder. | https://github.com/VEEXH/Ghost-Path-Traversal-CVE-2023-32235- | POC Details |
| 2 | A Directory Traversal attack (also known as path traversal) aims to access files and directories that are stored outside the intended folder. | https://github.com/AXRoux/Ghost-Path-Traversal-CVE-2023-32235- | POC Details |
| 3 | Ghost before 5.42.1 allows remote attackers to read arbitrary files within the active theme's folder via /assets/built%2F..%2F..%2F/ directory traversal. This occurs in frontend/web/middleware/static-theme.js. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-32235.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet