Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2021-46704 GenieACS Command Injection POC | https://github.com/MithatGuner/CVE-2021-46704-POC | POC Details |
| 2 | CVE-2021-46704 Nuclei template | https://github.com/Erenlancaster/CVE-2021-46704 | POC Details |
| 3 | In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-46704.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-26495 | nbd 输入验证错误漏洞 | |
| CVE-2022-26496 | nbd 缓冲区错误漏洞 | |
| CVE-2022-26505 | ReadyMedia 安全漏洞 | |
| CVE-2022-26490 | Linux kernel 安全漏洞 | |
| CVE-2021-46703 | Antaris RazorEngine 安全漏洞 | |
| CVE-2021-44421 | Occlum 安全漏洞 |
No comments yet