Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| zephyrproject-rtos | zephyr | v2.5.0 ~ unspecified | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2021-3625 - Sample exploits for Zephyr | https://github.com/szymonh/zephyr_cve-2021-3625 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2021-3510 | 7.5 HIGH | Zephyr JSON decoder incorrectly decodes array of array |
| CVE-2021-3581 | 7.0 HIGH | Buffer Access with Incorrect Length Value in zephyr |
| CVE-2021-3319 | 6.5 MEDIUM | DOS: Incorrect 802154 Frame Validation for Omitted Source / Dest Addresses |
| CVE-2021-3436 | 4.3 MEDIUM | BT: Possible to overwrite an existing bond during keys distribution phase when the identit |
No comments yet