Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/somatrasss/CVE-2025-29306 | POC Details |
| 2 | An issue in FoxCMS v.1.2.5 allows a remote attacker to execute arbitrary code via the case display page in the index.html component. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-29306.yaml | POC Details |
| 3 | None | https://github.com/verylazytech/CVE-2025-29306 | POC Details |
| 4 | None | https://github.com/inok009/FOXCMS-CVE-2025-29306-POC | POC Details |
| 5 | Proof-of-Concept (PoC) for CVE-2025-29306, a Remote Code Execution vulnerability in FoxCMS. This Python script scans single or multiple targets, executes commands, and reports vulnerable hosts. | https://github.com/Mattb709/CVE-2025-29306-PoC-FoxCMS-RCE | POC Details |
| 6 | None | https://github.com/congdong007/CVE-2025-29306_poc | POC Details |
| 7 | This tiny lab simulates the core idea behind CVE-2025-29306: unsafe use of `unserialize()` on attacker-controlled input leading to remote code execution. | https://github.com/amalpvatayam67/day06-foxcms-rce | POC Details |
| 8 | CVE-2025-29306 | https://github.com/B1ack4sh/Blackash-CVE-2025-29306 | POC Details |
| 9 | CVE-2025-29306 | https://github.com/Ashwesker/Blackash-CVE-2025-29306 | POC Details |
| 10 | CVE-2025-29306 | https://github.com/Ashwesker/Ashwesker-CVE-2025-29306 | POC Details |
| 11 | Mass Exploit for CVE-2025-29306 | https://github.com/mantanhacker/Mass-CVE-2025-29306 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet