尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack | https://github.com/pog007/CVE-2023-5561-PoC | POC详情 |
| 2 | Updated POC for Unauth Post Author Email Disclosures WordPress CVE-2023-5561 | https://github.com/rootxsushant/CVE-2023-5561-POC-Updated | POC详情 |
| 3 | WordPress Core is vulnerable to Sensitive Information Exposure in versions between 4.7.0 and 6.3.1 via the User REST endpoint. While the search results do not display user email addresses unless the requesting user has the 'list_users' capability, the search is applied to the user_email column. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-5561.yaml | POC详情 |
| 4 | CVE-2023-5561-PoC | https://github.com/dthkhang/CVE-2023-5561-PoC | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论