Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/xpgdgit/CVE-2022-31793 | POC Details |
| 2 | muhttpd 1.1.5 and before are vulnerable to unauthenticated local file inclusion. The vulnerability allows retrieval of files from the file system. | https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2022/CVE-2022-31793.yaml | POC Details |
| 3 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/muhttpd%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%20CVE-2022-31793.md | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-37030 | Grommunio Gromox 安全漏洞 | |
| CVE-2022-35858 | SAMSUNG mTower 安全漏洞 | |
| CVE-2022-35142 | Renato 授权问题漏洞 | |
| CVE-2022-35143 | Renato 安全漏洞 | |
| CVE-2022-35144 | Renato 跨站脚本漏洞 | |
| CVE-2022-34993 | TOTOLINK A3600R 信任管理问题漏洞 | |
| CVE-2022-34970 | Crow 安全漏洞 |
No comments yet