Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Carel pCOWeb HVAC BACnet Gateway 2.1.0 contains an unauthenticated arbitrary file disclosure caused by improper verification of the 'file' GET parameter in logdownload.cgi, letting attackers disclose sensitive files via directory traversal, exploit requires no authentication. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-37122.yaml | POC Details |
| 2 | CVE-2022-37122 Path Traversal Scanner | https://github.com/bughuntar/CVE-2022-37122-Exploit | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-39046 | 7.5 HIGH | GNU C Library 日志信息泄露漏洞 |
| CVE-2022-37128 | D-Link DIR-816 安全漏洞 | |
| CVE-2022-37123 | D-Link DIR-816 操作系统命令注入漏洞 | |
| CVE-2022-36619 | D-Link DIR-816 访问控制错误漏洞 | |
| CVE-2022-36203 | Doctor’s Appointment System 跨站脚本漏洞 | |
| CVE-2022-37125 | D-Link DIR-816 命令注入漏洞 | |
| CVE-2022-36201 | Doctor’s Appointment System SQL注入漏洞 | |
| CVE-2022-36202 | Doctor’s Appointment System 安全漏洞 | |
| CVE-2022-37129 | D-Link DIR-816 操作系统命令注入漏洞 | |
| CVE-2022-36568 | Tenda AC9 缓冲区错误漏洞 | |
| CVE-2022-36569 | Tenda AC9 缓冲区错误漏洞 | |
| CVE-2022-38812 | AeroCMS SQL注入漏洞 | |
| CVE-2022-37184 | Garage Management System 代码问题漏洞 | |
| CVE-2022-36566 | Rengine 操作系统命令注入漏洞 | |
| CVE-2022-37183 | Piwigo 跨站脚本漏洞 | |
| CVE-2022-28625 | Hewlett Packard Enterprise OneView 日志信息泄露漏洞 | |
| CVE-2022-30318 | Honeywell ControlEdge PLC 信任管理问题漏洞 | |
| CVE-2020-35538 | libjpeg-turbo 代码问题漏洞 | |
| CVE-2022-2466 | Quarkus 环境问题漏洞 | |
| CVE-2022-1508 | Linux kernel 缓冲区错误漏洞 |
Showing top 20 of 52 CVEs. View all on vendor page → →
No comments yet