Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/acquiredsecurity/CVE-2021-3122-Details | POC Details |
| 2 | CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration." | https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2021/CVE-2021-3122.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2021-26754 | WordPress SQL注入漏洞 | |
| CVE-2021-22161 | OpenWrt 安全漏洞 | |
| CVE-2021-26843 | sthttpd 缓冲区错误漏洞 | |
| CVE-2020-36243 | OpenEMR 操作系统命令注入漏洞 | |
| CVE-2020-36242 | python-cryptography 输入验证错误漏洞 |
No comments yet