Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ and possibly even older versions, may be vulnerable to an authentication bypass vulnerability in XMLRPC API (/cobbler_api) that can result in privilege escalation, data manipulation or exfiltration, and LDAP credential harvesting. This attack appear to be exploitable via "network connectivity". Taking advantage of improper validation of security tokens in API endpoints. Please note this is a different issue than CVE-2018-10931. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-1000226.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2018-1000657 | Rust Programming Language Rust standard library 缓冲区错误漏洞 | |
| CVE-2018-14020 | OXID eSales OXID eShop Paymorrow模块安全漏洞 | |
| CVE-2015-5243 | phpWhois 安全漏洞 | |
| CVE-2015-5160 | Red Hat libvirt 信息泄露漏洞 | |
| CVE-2018-14079 | Wi2be SMART HP WMT 安全漏洞 | |
| CVE-2016-7048 | PostgreSQL 安全漏洞 | |
| CVE-2018-1000218 | OpenEMR 跨站脚本漏洞 | |
| CVE-2018-1000217 | Dave Gamble cJSON 安全漏洞 | |
| CVE-2018-1000216 | Dave Gamble cJSON 安全漏洞 | |
| CVE-2018-1000215 | Dave Gamble cJSON 安全漏洞 | |
| CVE-2018-1000219 | OpenEMR 跨站脚本漏洞 | |
| CVE-2018-1000656 | Pallets Project Flask 输入验证错误漏洞 | |
| CVE-2018-1000655 | Jsish 安全漏洞 | |
| CVE-2018-1000654 | GNU Libtasn1 安全漏洞 | |
| CVE-2018-1000653 | ZZCMS SQL注入漏洞 | |
| CVE-2018-1000652 | JabRef MsBibImporter XML解析器安全漏洞 | |
| CVE-2018-1000651 | Stroom XML解析器安全漏洞 | |
| CVE-2018-1000650 | LibreHealthIO LH-EHR SQL注入漏洞 | |
| CVE-2018-1000649 | LibreHealthIO LH-EHR 安全漏洞 | |
| CVE-2018-1000648 | LibreHealthIO LH-EHR 安全漏洞 |
Showing top 20 of 60 CVEs. View all on vendor page → →
No comments yet