Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-36537

KEV · Ransomware EPSS 93.94% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-36537

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
ZK Framework v9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2 and 8.6.4.1 allows attackers to access sensitive information via a crafted POST request sent to the component AuUploader.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
ZK 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ZK是ZK公司的一个高产的开源Java框架,用于构建惊人的企业网和移动应用程序。 ZK Framework v9.6.1版本、9.6.0.1版本、9.5.1.3版本、9.0.1.2版本、8.6.4.1版本存在安全漏洞。攻击者利用该漏洞通过发送 AuUploader 组件的特制 POST 请求访问敏感信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2022-36537

#POC DescriptionSource LinkShenlong Link
1CVE-2022-36537https://github.com/agnihackers/CVE-2022-36537-EXPLOITPOC Details
2POC of CVE-2022-36537https://github.com/Malwareman007/CVE-2022-36537POC Details
3ZK Framework 9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2 and 8.6.4.1 is susceptible to information disclosure. An attacker can access sensitive information via a crafted POST request to the component AuUploader and thereby possibly obtain additional sensitive information, modify data, and/or execute unauthorized operations. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-36537.yamlPOC Details
4Nonehttps://github.com/ethan-repo-lab4b6/CVE-2022-36537POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-36537

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-08-26 · 53 CVEs total

CVE-2021-4216Artifex Software MuPDF 数字错误漏洞
CVE-2022-36548Edoc-doctor-appointment-system 跨站脚本漏洞
CVE-2022-36547Edoc-doctor-appointment-system 跨站脚本漏洞
CVE-2022-36542Edoc-doctor-appointment-system 安全漏洞
CVE-2022-36545Edoc-doctor-appointment-system SQL注入漏洞
CVE-2022-36544Edoc-doctor-appointment-system SQL注入漏洞
CVE-2022-36543Edoc-doctor-appointment-system SQL注入漏洞
CVE-2022-36546Edoc-doctor-appointment-system 跨站请求伪造漏洞
CVE-2022-0084Red Hat Data Grid 安全漏洞
CVE-2022-25625Broadcom Symantec Privileged Access Management 安全漏洞
CVE-2022-0168Linux kernel 代码问题漏洞
CVE-2021-3414Red Hat Satellite 安全漏洞
CVE-2021-3632Red Hat Single Sign-On 授权问题漏洞
CVE-2021-3585openstack-tripleo-heat-templates 安全漏洞
CVE-2021-3563Red Hat OpenStack Platform 安全漏洞
CVE-2021-3754Red Hat Keycloak 安全漏洞
CVE-2021-3735QEMU 安全漏洞
CVE-2021-3703Red Hat OpenShift 安全漏洞
CVE-2021-3688Red Hat JBoss Core Services 信息泄露漏洞
CVE-2021-3669Linux kernel资源管理错误漏洞

Showing top 20 of 53 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-36537

No comments yet


Leave a comment