Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| ABB | ASPECT-Enterprise | 0 ~ 3.08.03 | - | |
| ABB | NEXUS Series | 0 ~ 3.08.03 | - | |
| ABB | MATRIX Series | 0 ~ 3.08.03 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-2409 | 9.1 CRITICAL | Admin Authorized System File corruption |
| CVE-2025-2410 | 9.1 CRITICAL | Admin Authorized Port (iptables) manipulation (open/close/disable ports) |
| CVE-2024-48853 | 9.0 CRITICAL | Authenticated Escalation to guest to root |
| CVE-2025-30171 | 9.0 CRITICAL | Admin Authorized System File Deletion |
| CVE-2024-13955 | 8.8 HIGH | SQL Injection 2nd Order |
| CVE-2024-13952 | 8.4 HIGH | Remote Code Execution |
| CVE-2025-30172 | 8.0 HIGH | Admin Authorized Remote Code Execution |
| CVE-2024-9639 | 8.0 HIGH | Authenticated Remote Code Execution |
| CVE-2024-13957 | 7.6 HIGH | SSRF Server Side Request Forgery |
| CVE-2024-13951 | 7.6 HIGH | One way hash with predictable salt |
| CVE-2024-13948 | 7.3 HIGH | Insecure Permissions |
| CVE-2024-48850 | 7.2 HIGH | Authenticated Absolute Path Traversal |
| CVE-2024-13931 | 7.2 HIGH | Authenticated Relative Path Traversal |
| CVE-2024-13929 | 7.2 HIGH | Authenticated Servlet Command Injection |
| CVE-2024-13950 | 6.8 MEDIUM | Log Injection |
| CVE-2024-13949 | 6.8 MEDIUM | Log Forging |
| CVE-2024-13946 | 6.8 MEDIUM | Binary Planting / LoadLibrary DLL's not Signed |
| CVE-2024-13956 | 6.7 MEDIUM | SSL Verification Bypass |
| CVE-2025-30169 | 6.7 MEDIUM | Admin Authorized File Upload and Execute PHP |
| CVE-2025-30173 | 6.7 MEDIUM | Admin Authorized File Upload |
Showing top 20 of 30 CVEs. View all on vendor page → →
No comments yet