Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A directory traversal vulnerability in manager/controllers/default/resource/tvs.php in MODx Revolution 2.0.2-pl and possibly earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key parameter when magic_quotes_gpc is disabled. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2010/CVE-2010-5278.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2011-4363 | libproc-processtable-perl ‘/tmp/TTYDEVS’ 安全漏洞 | |
| CVE-2011-4909 | Joomla! 多个跨站脚本漏洞 | |
| CVE-2011-4910 | Joomla! 跨站脚本漏洞 | |
| CVE-2011-4911 | Joomla! 输入验证漏洞 | |
| CVE-2012-1414 | Plume CMS 跨站请求伪造漏洞 | |
| CVE-2010-5275 | Drupal Memcache模块跨站脚本漏洞 | |
| CVE-2010-5276 | Drupal Memcache模块权限许可和访问控制漏洞 | |
| CVE-2010-5277 | Drupal Views Bulk Operations模块未明安全漏洞 | |
| CVE-2011-3918 | Android Zygote进程资源管理错误漏洞 |
No comments yet