Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploits for Tenda Ac8v4 stack-based overflow to Remote-Code Execution via Mipsel Ropping (CVE-2023-33669 - CVE-2023-33675) | https://github.com/retr0reg/Tenda-Ac8v4-PoC | POC Details |
| 2 | Exploits for Tenda Ac8v4 stack-based overflow to Remote-Code Execution via Mipsel Ropping (CVE-2023-33669 - CVE-2023-33675) | https://github.com/retr0reg/tenda-ac8v4-rop | POC Details |
| 3 | Stack-Overflow on TendaAC8 | https://github.com/Mohammaddvd/CVE-2023-33669 | POC Details |
| 4 | Stack-Overflow on TendaAC8 | https://github.com/dhammerg/CVE-2023-33669 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-3056 | 4.3 MEDIUM | YFCMF index.php path traversal |
| CVE-2023-3057 | 4.3 MEDIUM | YFCMF Ajax.php path traversal |
| CVE-2023-33670 | Tenda AC8 缓冲区错误漏洞 | |
| CVE-2023-33671 | Tenda AC8 缓冲区错误漏洞 | |
| CVE-2023-33672 | Tenda AC8 缓冲区错误漏洞 | |
| CVE-2023-33673 | Tenda AC8 缓冲区错误漏洞 | |
| CVE-2023-33675 | Tenda AC8 缓冲区错误漏洞 | |
| CVE-2023-33761 | simpleRedak 跨站脚本漏洞 | |
| CVE-2023-33762 | simpleRedak SQL注入漏洞 | |
| CVE-2023-33763 | simpleRedak 跨站脚本漏洞 | |
| CVE-2023-33476 | ReadyMedia 缓冲区错误漏洞 | |
| CVE-2023-34362 | MoveIT SQL注入漏洞 | |
| CVE-2023-30149 | PrestaShop SQL注入漏洞 | |
| CVE-2022-24695 | Bluetooth Core Specification 安全漏洞 | |
| CVE-2023-28469 | ARM Mali GPU Kernel Driver 安全漏洞 | |
| CVE-2023-33717 | MP4v2 安全漏洞 | |
| CVE-2023-33731 | MicroWorld Technologies eScan Management Console 跨站脚本漏洞 | |
| CVE-2022-45938 | Comcast Defined Technologies microeisbss 跨站脚本漏洞 | |
| CVE-2023-27744 | South River Technologies TitanFTP NextGen 安全漏洞 | |
| CVE-2023-27745 | South River Technologies TitanFTP NextGen 安全漏洞 |
Showing top 20 of 24 CVEs. View all on vendor page → →
No comments yet