尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Jordy Meow | AI Engine: ChatGPT Chatbot | n/a ~ 1.9.98 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | AI Engine: ChatGPT Chatbot <= 1.9.98 - Unauthenticated Arbitrary File Upload via rest_upload | https://github.com/RandomRobbieBF/CVE-2023-51409 | POC详情 |
| 2 | AI Engine: ChatGPT Chatbot - Unauthenticated Arbitrary File Upload via rest_upload | https://github.com/imhunterand/CVE-2023-51409 | POC详情 |
| 3 | None | https://github.com/Nxploited/CVE-2023-51409 | POC详情 |
| 4 | Unrestricted Upload of File with Dangerous Type vulnerability in Jordy Meow AI Engine- ChatGPT Chatbot.This issue affects AI Engine- ChatGPT Chatbot- from n/a through 1.9.98. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-51409.yaml | POC详情 |
| 5 | Unauthenticated 0-click RCE exploit for CVE-2023-51409. Abuses an arbitrary file upload flaw in the AI Engine WordPress plugin to upload a PHP webshell and achieve remote command execution without authentication, including OS detection and an interactive shell. | https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2023-51409 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论