高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| ValvePress | Automatic | n/a ~ 3.92.0 | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | None | https://github.com/truonghuuphuc/CVE-2024-27956 | POC詳細 |
| 2 | PoC for wordpress takeover in CVE-2024-27956 | https://github.com/diego-tella/CVE-2024-27956-RCE | POC詳細 |
| 3 | CVE-2024-27956 WORDPRESS RCE PLUGIN | https://github.com/X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN | POC詳細 |
| 4 | None | https://github.com/FoxyProxys/CVE-2024-27956 | POC詳細 |
| 5 | CVE-2024-27956 | https://github.com/k3ppf0r/CVE-2024-27956 | POC詳細 |
| 6 | CVE-2024-27956 RCE POC WordPress | https://github.com/nancyariah4/CVE-2024-27956 | POC詳細 |
| 7 | WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries | https://github.com/AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956 | POC詳細 |
| 8 | None | https://github.com/W3BW/CVE-2024-27956-RCE-File-Package | POC詳細 |
| 9 | WordPress Automatic Plugin <= 3.92.0 - SQL Injection | https://github.com/Cappricio-Securities/CVE-2024-27956 | POC詳細 |
| 10 | None | https://github.com/itzheartzz/MASS-CVE-2024-27956 | POC詳細 |
| 11 | Valve Press - CVE-2024-27956-RCE - SQL Injection | https://github.com/TadashiJei/Valve-Press-CVE-2024-27956-RCE | POC詳細 |
| 12 | None | https://github.com/cve-2024/CVE-2024-27956-RCE | POC詳細 |
| 13 | Perform with massive Wordpress SQLI 2 RCE | https://github.com/ThatNotEasy/CVE-2024-27956 | POC詳細 |
| 14 | None | https://github.com/CERTologists/EXPLOITING-CVE-2024-27956 | POC詳細 |
| 15 | Yaml PoC rule for fscan. | https://github.com/7aRanchi/CVE-2024-27956-for-fscan | POC詳細 |
| 16 | The Automatic plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 3.92.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-27956.yaml | POC詳細 |
| 17 | Attacks a vulnerable WordPress site with the wp-automatic plugin. Inserts a new user called eviladmin directly into the database (INSERT INTO wp_users). Searches for the ID of the newly created user (cyclic SELECT). Promotes eviladmin to Administrator (INSERT INTO wp_usermeta). | https://github.com/m4nInTh3mIdDle/wordpress-CVE-2024-27956 | POC詳細 |
| 18 | CVE-2024-27956 - WP Automatic SQL Injection Exploit Tool | https://github.com/devsec23/CVE-2024-27956 | POC詳細 |
| 19 | CVE-2024-27956 | https://github.com/0axz-tools/CVE-2024-27956 | POC詳細 |
| 20 | Valve Press - CVE-2024-27956-RCE - SQL Injection | https://github.com/hitazuranahiro/Valve-Press-CVE-2024-27956-RCE | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成まだコメントはありません