Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Unknown | Hunk Companion | 0 ~ 1.9.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploit for CVE-2024-11972, Hunk Companion < 1.9.0 Unauthorized Plugin Installation | https://github.com/JunTakemura/exploit-CVE-2024-11972 | POC Details |
| 2 | CVE-2024-11972 in Hunk Companion <1.9.0 allows unauthenticated attackers to exploit insecure REST API endpoints and install vulnerable plugins, risking RCE, SQLi, XSS, and backdoors. | https://github.com/RonF98/CVE-2024-11972-POC | POC Details |
| 3 | Hunk Companion < 1.9.0 - Unauthenticated Plugin Installation | https://github.com/Nxploited/CVE-2024-11972-PoC | POC Details |
| 4 | The plugin does not correctly authorize some REST API endpoints, allowing unauthenticated requests to install and activate arbitrary plugins from the WordPress.org repo, including vulnerable plugins that have been closed. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-11972.yaml | POC Details |
| 5 | Exploit for CVE-2024-11972, Hunk Companion < 1.9.0 Unauthenticated Plugin Installation | https://github.com/NoxPengwin/exploit-CVE-2024-11972 | POC Details |
| 6 | Exploit for CVE-2024-11972, Hunk Companion < 1.9.0 Unauthenticated Plugin Installation | https://github.com/NoxPenguin/exploit-CVE-2024-11972 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet