Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-10924 PoC — WordPress ebook-download插件路径遍历漏洞

Source
Associated Vulnerability
Title:WordPress ebook-download插件路径遍历漏洞 (CVE-2016-10924)
Description:The ebook-download plugin before 1.2 for WordPress has directory traversal.
Description
CVE-2016-10924 - Directory traversal vulnerability in WordPress ebook-download plugin(<1.2).  PoC + PID Bruteforce in Python.
Readme
# CVE-2016-10924
CVE-2016-10924 - Directory traversal vulnerability in WordPress ebook-download plugin(&lt;1.2).  
PoC + PID Bruteforce in Python.


![alt text](https://github.com/rvizx/CVE-2016-10924/blob/main/image.gif?raw=true)

# Usage

```
git clone https://github.com/rvizx/CVE-2016-10924
cd CVE-2016-10924
python pidbrute.py
```
File Snapshot

[4.0K] /data/pocs/12b95a2106a43170b7f9c2728aa7362b132b2161 ├── [ 67K] image.gif ├── [1006] pidbrute.py └── [ 336] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →