mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 18:42:46 +00:00
29 lines
1.3 KiB
Markdown
29 lines
1.3 KiB
Markdown
### [CVE-2021-43936](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43936)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
The software allows the attacker to upload or transfer files of dangerous types to the WebHMI portal, that may be automatically processed within the product's environment or lead to arbitrary code execution.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/165252/WebHMI-4.0-Remote-Code-Execution.html
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/Ji82466dx21ohnDavi69no0dinans/awesome-security-vul-llm
|
|
- https://github.com/LongWayHomie/CVE-2021-43936
|
|
- https://github.com/Mav0y56cgi4rie8clu4e5vrBarnett/awesome-security-vul-llm
|
|
- https://github.com/NaInSec/CVE-PoC-in-GitHub
|
|
- https://github.com/SYRTI/POC_to_review
|
|
- https://github.com/WhooAmii/POC_to_review
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
- https://github.com/soosmile/POC
|
|
- https://github.com/trhacknon/Pocingit
|
|
- https://github.com/xu-xiang/awesome-security-vul-llm
|
|
- https://github.com/zecool/cve
|
|
|