Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Lindeni Mahlalela | Multi Purpose Mail Form | 0 ~ 1.0.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Unrestricted Upload of File with Dangerous Type | https://github.com/hatvix1/CVE-2024-50526-Private-POC | POC Details |
| 2 | Unauthenticated 0-click RCE exploit for CVE-2024-50526. Exploits an arbitrary file upload vulnerability in a vulnerable WordPress form plugin to upload a PHP payload, verify its location, detect the target operating system, and achieve remote command execution via an interactive shell. | https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-50526 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet