Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | eWeLinkESPT is a tool that automatically decodes and decrypts the WiFi network credentials transmitted to a supported ESP-based IoT device by the eWeLink mobile application. (CVE-2020-12702) | https://github.com/salgio/ESPTouchCatcher | POC Details |
| 2 | This repo describes a vulnerability affecting the QR code based pairing process of the eWeLink IoT devices (CVE-2020-12702). | https://github.com/salgio/eWeLink-QR-Code | POC Details |
No public POC found.
Login to generate AI POC| CVE-2020-11987 | Apache Batik 代码问题漏洞 | |
| CVE-2021-27645 | GNU C Library和glibc 资源管理错误漏洞 | |
| CVE-2021-3355 | LightCMS v跨站脚本漏洞 | |
| CVE-2020-28599 | Torsten Paul Openscad 缓冲区错误漏洞 | |
| CVE-2021-22667 | Advantech BB-ESWGP506-2SFP-T 信任管理问题漏洞 | |
| CVE-2021-21973 | VMware vCenter Server 代码问题漏洞 | |
| CVE-2021-21972 | VMware vSphere Client 路径遍历漏洞 | |
| CVE-2021-21974 | 威睿 VMware ESXi 缓冲区错误漏洞 | |
| CVE-2020-11988 | Apache XmlGraphics Commons 代码问题漏洞 |
No comments yet