Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2022-34320 | 5.9 MEDIUM | IBM CICS TX information disclosure |
| CVE-2022-34319 | 5.9 MEDIUM | IBM CICS TX information disclosure |
| CVE-2022-34317 | 5.4 MEDIUM | IBM CICS TX cross-site scripting |
| CVE-2022-34318 | 5.4 MEDIUM | IBM CICS TX clickjacking |
| CVE-2022-34315 | 5.4 MEDIUM | IBM CICS TX cross-site scripting |
| CVE-2022-38705 | 5.3 MEDIUM | IBM CICS TX phishing |
| CVE-2022-34329 | 5.3 MEDIUM | IBM CICS TX information disclosure |
| CVE-2022-35719 | 5.1 MEDIUM | IBM MQ Internet Pass-Thru 日志日志信息泄露漏洞 |
| CVE-2022-34313 | 4.3 MEDIUM | IBM CICS TX Standard is vulnerable to allowing attackers access to an application via inse |
| CVE-2022-34314 | 4.0 MEDIUM | IBM CICS TX 信息泄露漏洞 |
| CVE-2022-34316 | 3.7 LOW | IBM CICS TX information disclosure |
No comments yet