Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2013-2031 | Mediawiki ‘SVG’文件跨站脚本漏洞 | |
| CVE-2013-4556 | SPIP ‘editer_auteur.php’ 跨站脚本漏洞 | |
| CVE-2013-4555 | SPIP ‘logout.php’跨站请求伪造漏洞 | |
| CVE-2013-4551 | Xen 远程拒绝服务漏洞 | |
| CVE-2013-4510 | Tryton ‘main.py’任意文件写入漏洞 | |
| CVE-2013-4480 | Red Hat Satellite 权限许可和访问控制问题漏洞 | |
| CVE-2013-4425 | Pixmeo OsiriX Private Key 本地信息泄露漏洞 | |
| CVE-2013-4204 | Google WebRTC 跨站脚本漏洞 | |
| CVE-2013-2114 | MediaWiki 任意文件上传漏洞 | |
| CVE-2013-2061 | OpenVPN ‘openvpn_decrypt()’函数信息泄露漏洞 | |
| CVE-2013-2032 | Mediawiki ‘Password Reset’安全绕过漏洞 | |
| CVE-2013-0741 | ImageGen ‘font’参数跨站脚本漏洞 | |
| CVE-2013-1057 | Ubuntu MAAS Server 本地提权漏洞 | |
| CVE-2013-6797 | WordPres Blue Wrench Video Widget插件跨站请求伪造漏洞 | |
| CVE-2013-6631 | Google Chrome ‘Channel::SendRTCPPacket’函数释放后重用漏洞 | |
| CVE-2013-6630 | libjpeg-turbo 内存损坏漏洞 | |
| CVE-2013-6629 | libjpeg/libjpeg-turbo库内存损坏漏洞 | |
| CVE-2013-6042 | Softaculous Webuzo ‘user’参数跨站脚本漏洞 | |
| CVE-2013-5223 | D-Link DSL-2760U-BN 跨站脚本漏洞和HTML注入漏洞 | |
| CVE-2013-4519 | Beanbag Review Board 跨站脚本漏洞 |
Showing top 20 of 22 CVEs. View all on vendor page → →
No comments yet