Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Couchbase Server versions 4.0.0, 4.1.0, 4.1.1, 4.5.0, 4.5.1, 4.6.0-4.6.5, 5.0.0, 5.1.1, 5.5.0, and 5.5.1 contain insecure permissions for the projector and indexer REST endpoints caused by unauthenticated access, letting attackers access administrative APIs without authentication, exploit requires no special conditions. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-9039.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2020-9342 | F-Secure AV parsing engine 输入验证错误漏洞 | |
| CVE-2020-9341 | CandidATS 跨站请求伪造漏洞 | |
| CVE-2020-9340 | fauzantrif eLection SQL注入漏洞 | |
| CVE-2020-9336 | fauzantrif eLection 跨站脚本漏洞 | |
| CVE-2020-9338 | SOPlanning 跨站脚本漏洞 | |
| CVE-2020-9339 | SOPlanning 跨站脚本漏洞 | |
| CVE-2020-8813 | Cacti 操作系统命令注入漏洞 |
Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.