Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Ajit Bohra | WP Query Console | 0 ~ 1.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | WP Query Console <= 1.0 - Unauthenticated Remote Code Execution | https://github.com/RandomRobbieBF/CVE-2024-50498 | POC Details |
| 2 | This is a exploit for CVE-2024-50498 | https://github.com/p0et08/CVE-2024-50498 | POC Details |
| 3 | None | https://github.com/Nxploited/CVE-2024-50498 | POC Details |
| 4 | Improper Control of Generation of Code ('Code Injection') vulnerability in LUBUS WP Query Console allows Code Injection.This issue affects WP Query Console- from n/a through 1.0. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-50498.yaml | POC Details |
| 5 | Unauthenticated 0-click RCE exploit for CVE-2024-50498. Exploits a code injection vulnerability in the LUBUS WP Query Console plugin to execute arbitrary PHP code, write a web shell to the uploads directory, detect the target operating system, and achieve remote command execution via an interactive shell. | https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-50498 | POC Details |
| 6 | None | https://github.com/androidteacher/CVE-2024-50498-wpquery | POC Details |
No public POC found.
Login to generate AI POCPatrice & Associates Scottsdale, AZ, United Stateѕ 16265237726 hospitality executive recruiter