高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| hashthemes | Hash Form – Drag & Drop Form Builder | * ~ 1.1.0 | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution | https://github.com/KTN1990/CVE-2024-5084 | POC詳細 |
| 2 | Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution | https://github.com/Chocapikk/CVE-2024-5084 | POC詳細 |
| 3 | None | https://github.com/k3lpi3b4nsh33/CVE-2024-5084 | POC詳細 |
| 4 | PoC Exploit for CVE-2024-5084 | https://github.com/WOOOOONG/CVE-2024-5084 | POC詳細 |
| 5 | Материалы для научной работы | https://github.com/z1gazaga/CVE-2024-5084 | POC詳細 |
| 6 | None | https://github.com/Raeezrbr/CVE-2024-5084 | POC詳細 |
| 7 | None | https://github.com/ModeBrutal/CVE-2024-5084-Auto-Exploit | POC詳細 |
| 8 | The Hash Form Drag & Drop Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'file_upload_action' function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-5084.yaml | POC詳細 |
| 9 | None | https://github.com/NanoWraith/CVE-2024-5084 | POC詳細 |
| 10 | None | https://github.com/RedTeamBlueTeam/CVE-2024-5084-Red-Team | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2024-5085 | 8.1 HIGH | Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated PHP Object Injection |
| CVE-2024-5177 | 6.4 MEDIUM | Hash Elements <= 1.3.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via url |
まだコメントはありません