Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2008-4830 | SAP GUI KWEditActiveX控件不安全SaveDocumentAs()调用漏洞 | |
| CVE-2008-5259 | DivX Web Player STRF块处理堆溢出漏洞 | |
| CVE-2009-0196 | Ghostscript jbig2dec库JBIG2处理堆溢出漏洞 | |
| CVE-2009-0579 | kernel linux-pam '/etc/shadow'权限许可和访问控制漏洞 | |
| CVE-2009-1285 | phpMyAdmin "ConfigFile.class.php"函数 PHP代码注入漏洞 | |
| CVE-2009-1293 | Novell Teaming 用户枚举漏洞 | |
| CVE-2009-1294 | Novell Teaming 'web/guest/home'跨站脚本攻击漏洞 | |
| CVE-2009-1300 | apt 输入验证错误漏洞 | |
| CVE-2009-1301 | mpg123 'libmpg123/id3.cs'内存破坏漏洞 |
No comments yet