Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | D-Link DNS-320 FW v2.06B01 Revision Ax is susceptible to a command injection vulnerability in a system_mgr.cgi component. The component does not successfully sanitize the value of the HTTP parameters f_ntp_server, which in turn leads to arbitrary command execution. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-25506.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2020-7775 | 9.8 CRITICAL | Command Injection |
| CVE-2020-28494 | 8.6 HIGH | Command Injection |
| CVE-2020-28495 | 7.3 HIGH | Prototype Pollution |
| CVE-2020-28498 | 6.8 MEDIUM | Cryptographic Issues |
| CVE-2021-0359 | Google Android 缓冲区错误漏洞 | |
| CVE-2020-8672 | 多款Intel产品缓冲区错误漏洞 | |
| CVE-2020-24490 | Linux kernel 缓冲区错误漏洞 | |
| CVE-2021-0365 | Google Android 资源管理错误漏洞 | |
| CVE-2021-0364 | Google Android 命令注入漏洞 | |
| CVE-2021-0363 | Google Android 命令注入漏洞 | |
| CVE-2021-0362 | Google Android 缓冲区错误漏洞 | |
| CVE-2021-0361 | Google Android 缓冲区错误漏洞 | |
| CVE-2021-0360 | Google Android 缓冲区错误漏洞 | |
| CVE-2020-8734 | Intel Server Board M10JNP2SB 输入验证错误漏洞 | |
| CVE-2021-0358 | Google Android 命令注入漏洞 | |
| CVE-2021-0357 | Google Android 缓冲区错误漏洞 | |
| CVE-2021-0356 | Google Android 命令注入漏洞 | |
| CVE-2021-0355 | Google Android 输入验证错误漏洞 | |
| CVE-2021-0354 | Google Android 输入验证错误漏洞 | |
| CVE-2021-0353 | Google Android 缓冲区错误漏洞 |
Showing top 20 of 38 CVEs. View all on vendor page → →
No comments yet