Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-41917 | 10.0 CRITICAL | Improper input validation in Kiloview P1/P2 devices allows for remote code execution |
| CVE-2023-41918 | 10.0 CRITICAL | Missing Authentication for Critical Function in Kiloview P1/P2 devices |
| CVE-2023-41919 | 9.8 CRITICAL | Use of Hard-coded Credentials in Kiloview P1/P2 devices |
| CVE-2023-41920 | 9.8 CRITICAL | Authentication Bypass by Primary Weakness in Kiloview P1/P2 devices |
| CVE-2023-41921 | 9.8 CRITICAL | Download of Code Without Integrity Check in Kiloview P1/P2 devices |
| CVE-2023-41926 | 8.8 HIGH | Insufficiently protected credentials in Kiloview P1/P2 devices |
| CVE-2023-41922 | 7.2 HIGH | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Ki |
| CVE-2023-41923 | 7.2 HIGH | Weak Password Requirements in Kiloview P1/P2 devices |
| CVE-2023-41927 | 5.3 MEDIUM | Weak TLS Cipher Suites Supported in Kiloview P1/P2 devices |
No comments yet