Lucene search

K
githubexploit068F9A3B-3B2A-5C00-A1F2-CB7F95247837
HistoryJun 02, 2024 - 10:49 a.m.

Exploit for CVE-2024-25600

2024-06-0210:49:03
10
cve-2024-25600
exploit
wordpress
remote code execution
nonce
request crafting
response parsing
interactive mode
batch mode
vulnerability scanning
installation
usage
proof of concept
reference
disclaimer
acknowledgements

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.2%

CVE-2024-25600 Exploit Tool 🚀

Disclaimer: This tool is own…

This is an article that belongs to githubexploit private collection.
Please sign in to get more Information.

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.2%