Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | In Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi allows an unauthenticated attacker to bypass authentication and execute arbitrary commands via shell metacharacters in the ipaddr params JSON data for the put method. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-45852.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-26155 | 7.3 HIGH | QPDF 命令注入漏洞 |
| CVE-2023-30148 | 6.1 MEDIUM | PrestaShop 跨站脚本漏洞 |
| CVE-2023-5582 | 3.5 LOW | ZZZCMS Personal Profile Page cross site scripting |
| CVE-2023-30154 | PrestaShop SQL注入漏洞 | |
| CVE-2023-45853 | zlib 输入验证错误漏洞 | |
| CVE-2023-45856 | qdPM 代码问题漏洞 | |
| CVE-2023-45855 | qdPM 路径遍历漏洞 | |
| CVE-2023-44037 | ZPE Systems Nodegrid OS 安全漏洞 | |
| CVE-2023-45863 | Linux kernel 缓冲区错误漏洞 | |
| CVE-2023-45862 | Linux kernel 安全漏洞 |
No comments yet