Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2022-25776 | 8.3 HIGH | Sensitive Data Exposure due to inadequate user permission settings |
| CVE-2022-25770 | 7.8 HIGH | Insufficient authentication in upgrade flow |
| CVE-2021-27917 | 7.3 HIGH | XSS in contact tracking and page hits report |
| CVE-2022-25769 | 7.2 HIGH | Improper regex in htaccess file |
| CVE-2022-25768 | 7.0 HIGH | Improper Access Control in UI upgrade process |
| CVE-2022-25777 | 6.5 MEDIUM | Server-Side Request Forgery in Asset section |
| CVE-2024-47050 | 5.4 MEDIUM | XSS in contact/company tracking (no authentication) |
| CVE-2022-25774 | 4.8 MEDIUM | XSS in Notifications via saving Dashboards |
| CVE-2024-47059 | 4.3 MEDIUM | Users enumeration - weak password login |
| CVE-2024-47058 | 2.9 LOW | Cross-site Scripting (XSS) - stored (edit form HTML field) |
No comments yet