Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| wpmudev | Forminator – Contact Form, Payment Form & Custom Form Builder | * ~ 1.24.6 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | PoC Script for CVE-2023-4596, unauthenticated Remote Command Execution through arbitrary file uploads. | https://github.com/E1A/CVE-2023-4596 | POC Details |
| 2 | special thanks to E1A for the POC of the CVE Exploit found here: https://github.com/E1A/CVE-2023-4596 | https://github.com/AlabamicHero/caldera_sandcat-usecase | POC Details |
| 3 | CVE-2023-4596 Vulnerable Exploit and Checker Version | https://github.com/X-Projetion/CVE-2023-4596-Vulnerable-Exploit-and-Checker-Version | POC Details |
| 4 | None | https://github.com/RHYru9/CVE-2023-4596-checker | POC Details |
| 5 | CVE-2024-6387-checker is a tool or script designed to detect the security vulnerability known as CVE-2024-6387 OpenSSH. CVE-2024-6387 OpenSSH is an entry in the Common Vulnerabilities and Exposures (CVE) that documents security weaknesses discovered in certain software or systems. | https://github.com/X-Projetion/CVE-2023-4596-OpenSSH-Multi-Checker | POC Details |
| 6 | The Forminator plugin for WordPress is vulnerable to arbitrary file uploads due to file type validation occurring after a file has been uploaded to the server in the upload_post_image() function in versions up to, and including, 1.24.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-4596.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet