Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Unknown | Base64 Encoder/Decoder | 0 ~ 0.9.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | The Base64 Encoder/Decoder WordPress plugin through 0.9.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-3822.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-3749 | SP Project & Document Manager <= 4.71 - Subscriber+ File Download via IDOR | |
| CVE-2024-3823 | Base64 Encoder/Decoder <= 0.9.2 - Stored XSS via CSRF | |
| CVE-2024-3824 | Base64 Encoder/Decoder <= 0.9.2 - Settings Reset via CSRF | |
| CVE-2024-3629 | HL Twitter <= 2014.1.18 - Settings Update via CSRF | |
| CVE-2024-3630 | HL Twitter <= 2014.1.18 - Admin+ Stored XSS via Widget | |
| CVE-2024-3634 | month name translation benaceur < 2.3.8 - Admin+ Stored XSS | |
| CVE-2024-3631 | HL Twitter <= 2014.1.18 - Unlink Twitter Account via CSRF | |
| CVE-2024-3748 | SP Project & Document Manager <= 4.71 - Data Update via IDOR | |
| CVE-2024-3406 | WP Prayer <= 2.0.9 - Email Settings Update via CSRF | |
| CVE-2024-3407 | WP Prayer <= 2.0.9 - Arbitrary Prayer Deletion via CSRF | |
| CVE-2024-3548 | Shortcodes Ultimate < 7.1.2 - Contributor+ Stored XSS | |
| CVE-2024-3405 | WP Prayer <= 2.0.9 - Settings Update via CSRF |
No comments yet