Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Certain Canon devices manufactured in 2012 through 2020 (such as imageRUNNER ADVANCE iR-ADV C5250), when Catwalk Server is enabled for HTTP access, allow remote attackers to modify an e-mail address setting, and thus cause the device to send sensitive information through e-mail to the attacker. For example, an incoming FAX may be sent through e-mail to the attacker. This occurs when a PIN is not required for General User Mode, as exploited in the wild in August 2021. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-38154.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2021-40172 | ZOHO ManageEngine Log360 跨站请求伪造漏洞 | |
| CVE-2021-40173 | ZOHO ManageEngine Cloud Security Plus 跨站请求伪造漏洞 | |
| CVE-2021-40174 | ZOHO ManageEngine Log360 跨站请求伪造漏洞 | |
| CVE-2021-40175 | ZOHO ManageEngine Log360 代码问题漏洞 | |
| CVE-2021-40176 | ZOHO ManageEngine Log360 跨站脚本漏洞 | |
| CVE-2021-40177 | ZOHO ManageEngine Log360 代码问题漏洞 | |
| CVE-2021-40178 | ZOHO ManageEngine Log360 跨站脚本漏洞 |
No comments yet