Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| ultimatemember | Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin | 2.1.3 ~ 2.8.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Ultimate Member Unauthorized Database Access / SQLi | https://github.com/gbrsh/CVE-2024-1071 | POC Details |
| 2 | CVE-2024-1071 with Docker | https://github.com/Trackflaw/CVE-2024-1071-Docker | POC Details |
| 3 | CVE-2024-1071 | https://github.com/Matrexdz/CVE-2024-1071 | POC Details |
| 4 | None | https://github.com/Matrexdz/CVE-2024-1071-Docker | POC Details |
| 5 | CVE-2024-1071 | https://github.com/Nadjibbtabani/CVE-2024-1071 | POC Details |
| 6 | None | https://github.com/Nadjibbtabani/CVE-2024-1071-Docker | POC Details |
| 7 | Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited | https://github.com/fa-rrel/CVE-2024-1071-SQL-Injection | POC Details |
| 8 | None | https://github.com/Dogu589/WordPress-Exploit-CVE-2024-1071 | POC Details |
| 9 | wp/ultimate-member - SQL Injection Vulnerability Exploit Script. | https://github.com/Spid3heX/CVE-2024-1071-PoC-Script | POC Details |
| 10 | Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited | https://github.com/gh-ost00/CVE-2024-1071-SQL-Injection | POC Details |
| 11 | The Ultimate Member - User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to SQL Injection via the ‘sorting’ parameter in versions 2.1.3 to 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-1071.yaml | POC Details |
| 12 | None | https://github.com/dogucyber/WordPress-Exploit-CVE-2024-1071 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet