Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| jurredeklijn | Wux Blog Editor | * ~ 3.0.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Wux Blog Editor <= 3.0.0 - Unauthenticated Arbitrary File Upload | https://github.com/RandomRobbieBF/CVE-2024-9932 | POC Details |
| 2 | None | https://github.com/Nxploited/CVE-2024-9932-POC | POC Details |
| 3 | Unauthenticated 0-click RCE exploit for CVE-2024-9932. Exploits an arbitrary file upload vulnerability in the Wux Blog Editor WordPress plugin to upload a remote PHP payload, detect the target operating system, and achieve remote command execution through an interactive web shell. | https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-9932 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet