CVE-2020-24186
- Reference to the description:
- Description:
- A Remote Code Execution vulnerability exists in the gVectors wpDiscuz plugin 7.0 through 7.0.4 for WordPress, which allows unauthenticated users to upload any type of file, including PHP files via the wmuUploadFiles AJAX action.
- Last updated date:
- 01/01/2022
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 06/13/2021
- Reference url to background
https://github.com/h3v0x/CVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 06/13/2021
- Reference url to background
https://github.com/hev0x/CVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 06/13/2021
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 06/28/2021
- Reference url to background
http://packetstormsecurity.com/files/162983/WordPress-wpDiscuz-7.0.4-Shell-Upload.html
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 06/28/2021
- Reference url to background
http://packetstormsecurity.com/files/163012/WordPress-wpDiscuz-7.0.4-Remote-Code-Execution.html
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 06/28/2021
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 08/27/2021
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 01/01/2022
- Reference url to background
http://packetstormsecurity.com/files/163302/WordPress-wpDiscuz-7.0.4-Shell-Upload.html
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 04/05/2022
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 12/21/2023
- Reference url to background
https://github.com/substing/CVE-2020-24186_reverse_shell_upload