Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | PoC for CVE-2020-28032 (It's just a POP chain in WordPress < 5.5.2 for exploiting PHP Object Injection) | https://github.com/nth347/CVE-2020-28032_PoC | POC Details |
No public POC found.
Login to generate AI POC| CVE-2020-27359 | REDCap 跨站脚本漏洞 | |
| CVE-2020-27358 | REDCap 授权问题漏洞 | |
| CVE-2020-27992 | Wondershare Dr.Fone 代码问题漏洞 | |
| CVE-2020-28033 | WordPress 安全漏洞 | |
| CVE-2020-28034 | WordPress 跨站脚本漏洞 | |
| CVE-2020-28036 | WordPress 安全漏洞 | |
| CVE-2020-28037 | WordPress 代码问题漏洞 | |
| CVE-2020-28038 | WordPress 跨站脚本漏洞 | |
| CVE-2020-28040 | WordPress 跨站请求伪造漏洞 | |
| CVE-2020-28039 | WordPress 安全漏洞 | |
| CVE-2020-28035 | WordPress 安全漏洞 |
No comments yet