Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2012-2093 | Gajim ‘src/common/latex.py’ 任意文件重写漏洞 | |
| CVE-2012-2118 | X.Org本地格式化字符串漏洞 | |
| CVE-2012-2120 | texlive-extra-utils ‘latex2man’ 任意文件重写漏洞 | |
| CVE-2012-2320 | ConnMan安全绕过漏洞 | |
| CVE-2012-2321 | ConnMan ‘loopback’ 插件任意命令执行漏洞 | |
| CVE-2012-2322 | ConnMan ‘gdhcp/client.c’ 整数溢出漏洞 | |
| CVE-2012-2341 | Drupal ‘Take Control’ 模块跨站请求伪造漏洞 | |
| CVE-2012-1589 | Drupal开放重定向漏洞 | |
| CVE-2012-2337 | Sudo本地权限提升漏洞 | |
| CVE-2012-2406 | RealNetworks RealPlayer任意代码执行漏洞 | |
| CVE-2012-2411 | RealNetworks RealPlayer缓冲区溢出漏洞 |
No comments yet