Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| ProjectSend | ProjectSend | 0 ~ r1720 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2024-11680: Improper Authentication (CWE-287) | https://github.com/famixcm/CVE-2024-11680 | POC Details |
| 2 | None | https://github.com/exploitboom/CVE-2024-11680 | POC Details |
| 3 | This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues. | https://github.com/D3N14LD15K/CVE-2024-11680_PoC_Exploit | POC Details |
| 4 | An improper authorization check was identified within ProjectSend version r1605 that allows an attacker to perform sensitive actions such as enabling user registration and auto validation, or adding new entries in the whitelist of allowed extensions for uploaded files. Ultimately, this allows to execute arbitrary PHP code on the server hosting the application. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-11680.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet