Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | FlatPress 1.2.1 contains a stored cross-site scripting vulnerability that allows for arbitrary execution of JavaScript commands through blog content. An attacker can steal cookie-based authentication credentials and launch other attacks. Note: this is similar to CVE-2021-41432, however this attack uses the "page" parameter. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/other/flatpress-xss.yaml | POC Details |
| 2 | FlatPress 1.2.1 contains a stored cross-site scripting vulnerability that allows for arbitrary execution of JavaScript commands through blog content. An attacker can possibly steal cookie-based authentication credentials and launch other attacks. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-41432.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-32128 | 74cms 跨站脚本漏洞 | |
| CVE-2022-32131 | 74cms 跨站脚本漏洞 | |
| CVE-2022-33093 | 74cms SQL注入漏洞 | |
| CVE-2022-33096 | 74cms SQL注入漏洞 | |
| CVE-2022-33097 | 74cms SQL注入漏洞 | |
| CVE-2022-34328 | PMB 跨站脚本漏洞 | |
| CVE-2022-33127 | Diffy 安全漏洞 | |
| CVE-2022-33124 | aiohttp 安全漏洞 | |
| CVE-2022-33095 | 74cms SQL注入漏洞 | |
| CVE-2022-32129 | 74cms 跨站脚本漏洞 | |
| CVE-2022-32130 | 74cms 跨站脚本漏洞 | |
| CVE-2022-32127 | 74cms 跨站脚本漏洞 | |
| CVE-2022-32126 | 74cms 跨站脚本漏洞 | |
| CVE-2022-32125 | 74cms 跨站脚本漏洞 | |
| CVE-2022-32124 | 74cms 跨站脚本漏洞 | |
| CVE-2022-31361 | Docebo Community Edition SQL注入漏洞 | |
| CVE-2022-31362 | Docebo Community Edition 代码问题漏洞 | |
| CVE-2022-34295 | totd 安全特征问题漏洞 | |
| CVE-2022-31787 | IdeaTMS SQL注入漏洞 | |
| CVE-2022-34299 | libdwarf 缓冲区错误漏洞 |
Showing top 20 of 46 CVEs. View all on vendor page → →
No comments yet