Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Trend Micro Threat Discovery Appliance 2.6.1062r1 is vulnerable to a directory traversal vulnerability when processing a session_id cookie, which allows a remote, unauthenticated attacker to delete arbitrary files as root. This can be used to bypass authentication or cause a DoS. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2016/CVE-2016-7552.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2017-3029 | Adobe Acrobat和Reader 缓冲区错误漏洞 | |
| CVE-2017-3042 | Adobe Acrobat和Reader 缓冲区错误漏洞 | |
| CVE-2017-3041 | Adobe Acrobat和Reader 缓冲区错误漏洞 | |
| CVE-2017-3040 | Adobe Acrobat和Reader 安全漏洞 | |
| CVE-2017-3039 | Adobe Acrobat和Reader 缓冲区错误漏洞 | |
| CVE-2017-3038 | Adobe Acrobat和Reader 缓冲区错误漏洞 | |
| CVE-2017-3037 | Adobe Acrobat和Reader 缓冲区错误漏洞 | |
| CVE-2017-3036 | Adobe Acrobat和Reader 安全漏洞 | |
| CVE-2017-3035 | Adobe Acrobat和Reader 安全漏洞 | |
| CVE-2017-3034 | Adobe Acrobat和Reader XML Forms Architecture引擎数字错误漏洞 | |
| CVE-2017-3033 | Adobe Acrobat和Reader 安全漏洞 | |
| CVE-2017-3032 | Adobe Acrobat和Reader 安全漏洞 | |
| CVE-2017-3031 | Adobe Acrobat和Reader 安全漏洞 | |
| CVE-2017-3030 | Adobe Acrobat和Reader AES 缓冲区错误漏洞 | |
| CVE-2017-3019 | Adobe Acrobat和Reader Product Representation Compact格式解析器安全漏洞 | |
| CVE-2017-3022 | Adobe Acrobat和Reader 安全漏洞 | |
| CVE-2017-3021 | Adobe Acrobat和Reader JPEG 2000解析器引擎安全漏洞 | |
| CVE-2017-3020 | Adobe Acrobat和Reader weblink 缓冲区错误漏洞 | |
| CVE-2017-3023 | Adobe Acrobat和Reader 缓冲区错误漏洞 | |
| CVE-2017-3018 | Adobe Acrobat和Reader 安全漏洞 |
Showing top 20 of 108 CVEs. View all on vendor page → →
No comments yet