Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Open redirect vulnerability in Users/Account/LogOff in Orchard 1.0.x before 1.0.21, 1.1.x before 1.1.31, 1.2.x before 1.2.42, and 1.3.x before 1.3.10 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the ReturnUrl parameter. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2011/CVE-2011-5252.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2011-5253 | dl Download Ticket Service 认证绕过漏洞 | |
| CVE-2011-5254 | WordPress Connections插件未明安全漏洞 | |
| CVE-2012-5874 | Elite Bulletin Board 多个SQL输入漏洞 | |
| CVE-2012-6499 | WordPress Age Verification插件 ‘redirect_to’ 参数URL重定向漏洞 | |
| CVE-2012-6500 | Pragyan CMS ‘fileget’ 参数远程文件泄露漏洞 | |
| CVE-2012-6501 | HP PKI ActiveX拒绝服务漏洞 | |
| CVE-2013-0154 | Xen 本地拒绝服务漏洞 |
No comments yet