Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| webdevmattcrom | GiveWP – Donation Plugin and Fundraising Platform | * ~ 3.16.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/maybeheisenberg/CVE-2024-8353 | POC Details |
| 2 | Proof-of-Concept for CVE-2024-8353 | https://github.com/EQSTLab/CVE-2024-8353 | POC Details |
| 3 | None | https://github.com/p33d/CVE-2024-8353 | POC Details |
| 4 | None | https://github.com/nothe1senberg/CVE-2024-8353 | POC Details |
| 5 | Proof-of-Concept for CVE-2024-5932 GiveWP PHP Object Injection | https://github.com/0xb0mb3r/CVE-2024-8353-PoC | POC Details |
| 6 | The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.16.1. This is due to insufficient input validation on user-supplied data. An unauthenticated attacker can inject a serialized PHP object, which may allow them to execute arbitrary PHP code, depending on the presence of a suitable POP chain on the target system. This vulnerability could lead to full site compromise. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-8353.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet