尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| wpmudev | Forminator – Contact Form, Payment Form & Custom Form Builder | * ~ 1.24.6 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | PoC Script for CVE-2023-4596, unauthenticated Remote Command Execution through arbitrary file uploads. | https://github.com/E1A/CVE-2023-4596 | POC详情 |
| 2 | special thanks to E1A for the POC of the CVE Exploit found here: https://github.com/E1A/CVE-2023-4596 | https://github.com/AlabamicHero/caldera_sandcat-usecase | POC详情 |
| 3 | CVE-2023-4596 Vulnerable Exploit and Checker Version | https://github.com/X-Projetion/CVE-2023-4596-Vulnerable-Exploit-and-Checker-Version | POC详情 |
| 4 | None | https://github.com/RHYru9/CVE-2023-4596-checker | POC详情 |
| 5 | CVE-2024-6387-checker is a tool or script designed to detect the security vulnerability known as CVE-2024-6387 OpenSSH. CVE-2024-6387 OpenSSH is an entry in the Common Vulnerabilities and Exposures (CVE) that documents security weaknesses discovered in certain software or systems. | https://github.com/X-Projetion/CVE-2023-4596-OpenSSH-Multi-Checker | POC详情 |
| 6 | The Forminator plugin for WordPress is vulnerable to arbitrary file uploads due to file type validation occurring after a file has been uploaded to the server in the upload_post_image() function in versions up to, and including, 1.24.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-4596.yaml | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论