尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| nickboss | WordPress File Upload | * ~ 4.24.11 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | WordPress File Upload插件任意文件读取漏洞(CVE-2024-9047)批量检测脚本 | https://github.com/iSee857/CVE-2024-9047-PoC | POC详情 |
| 2 | POC - WordPress File Upload plugin, in the wfu_file_downloader.php file before version <= 4.24.11 | https://github.com/verylazytech/CVE-2024-9047 | POC详情 |
| 3 | Exploit for WordPress File Upload Plugin - All versions up to 4.24.11 are vulnerable. | https://github.com/Nxploited/CVE-2024-9047-Exploit | POC详情 |
| 4 | CVE-2024-9047, wfu_file_downloader.php | https://github.com/chihyeonwon/CVE-2024-9047 | POC详情 |
| 5 | CVE-2024-9047, wfu_file_downloader.php | https://github.com/mr-won/CVE-2024-9047 | POC详情 |
| 6 | The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-9047.yaml | POC详情 |
| 7 | CVE-2024-9047, wfu_file_downloader.php | https://github.com/user20252228/CVE-2024-9047 | POC详情 |
| 8 | CVE-2024-9047, wfu_file_downloader.php | https://github.com/tpdlshdmlrkfmcla/CVE-2024-9047 | POC详情 |
| 9 | CVE-2024-9047 | https://github.com/amirqusairy99/WordPress-File-Upload-4.24.11---Unauthenticated-Path-Traversal | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论