Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | This repository contains a Proof of Concept (PoC) demonstrating a critical vulnerability in givanz Vvveb 1.0.5. The vulnerability allows an authenticated user with template editing privileges to write arbitrary PHP code to server files, leading to Remote Code Execution (RCE). | https://github.com/maestro-ant/Vvveb-CMS-CVE-2025-8518 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-8517 | 6.3 MEDIUM | givanz Vvveb session fixiation |
| CVE-2025-8522 | 5.0 MEDIUM | givanz Vvvebjs node.js save.php path traversal |
| CVE-2025-8520 | 4.7 MEDIUM | givanz Vvveb Drag-and-Drop Editor editor server-side request forgery |
| CVE-2025-8519 | 2.7 LOW | givanz Vvveb Drag-and-Drop Editor editor information disclosure |
| CVE-2025-8521 | 2.4 LOW | givanz Vvveb Add Type post-types cross site scripting |
No comments yet