You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: db/modules_metadata_base.json
+68-2Lines changed: 68 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -114538,6 +114538,72 @@
114538
114538
"session_types": false,
114539
114539
"needs_cleanup": true
114540
114540
},
114541
+
"exploit_multi/http/wp_givewp_rce": {
114542
+
"name": "GiveWP Unauthenticated Donation Process Exploit",
114543
+
"fullname": "exploit/multi/http/wp_givewp_rce",
114544
+
"aliases": [
114545
+
114546
+
],
114547
+
"rank": 600,
114548
+
"disclosure_date": "2024-08-25",
114549
+
"type": "exploit",
114550
+
"author": [
114551
+
"Villu Orav",
114552
+
"EQSTSeminar",
114553
+
"Julien Ahrens",
114554
+
"Valentin Lobstein"
114555
+
],
114556
+
"description": "The GiveWP Donation Plugin and Fundraising Platform plugin for WordPress in all versions up to and including 3.14.1 is vulnerable to a PHP Object Injection (POI) attack granting an unauthenticated arbitrary code execution.",
"description": "This module attempts to determine whether the system is running\n inside of a virtual environment and if so, which one. This\n module supports detection of Hyper-V, VMWare, VirtualBox, Xen,\n and QEMU/KVM.",
254756
+
"description": "This module attempts to determine whether the system is running\n inside of a virtual environment and if so, which one. This\n module supports detection of Hyper-V, VMWare, VirtualBox, Xen,\n Bhyve and QEMU/KVM.",
0 commit comments