Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Ateeq Rafeeq | RepairBuddy | 0 ~ 3.8115 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | WordPress RepairBuddy plugin <= 3.8115 - Arbitrary File Upload vulnerability | https://github.com/Nxploited/CVE-2024-51793 | POC Details |
| 2 | (CVE-2024-51793) Wordpress Plugin: Computer Repair Shop <= 3.8115 - Unauthenticated Arbitrary File Upload | https://github.com/KTN1990/CVE-2024-51793 | POC Details |
| 3 | None | https://github.com/0axz-tools/CVE-2024-51793 | POC Details |
| 4 | Unauthenticated 0-click RCE exploit for CVE-2024-51793. Exploits an arbitrary file upload vulnerability via admin-ajax.php to upload a PHP payload and achieve remote command execution on vulnerable WordPress installations, including OS detection and an interactive command shell. | https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-51793 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet