Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| ABB | ASPECT-Enterprise | 0 ~ 3.* | - | |
| ABB | NEXUS Series | 0 ~ 3.* | - | |
| ABB | MATRIX Series | 0 ~ 3.* | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-2410 | 9.1 CRITICAL | Admin Authorized Port (iptables) manipulation (open/close/disable ports) |
| CVE-2025-2409 | 9.1 CRITICAL | Admin Authorized System File corruption |
| CVE-2024-48853 | 9.0 CRITICAL | Authenticated Escalation to guest to root |
| CVE-2025-30171 | 9.0 CRITICAL | Admin Authorized System File Deletion |
| CVE-2024-13955 | 8.8 HIGH | SQL Injection 2nd Order |
| CVE-2024-13952 | 8.4 HIGH | Remote Code Execution |
| CVE-2024-9639 | 8.0 HIGH | Authenticated Remote Code Execution |
| CVE-2025-30172 | 8.0 HIGH | Admin Authorized Remote Code Execution |
| CVE-2024-13957 | 7.6 HIGH | SSRF Server Side Request Forgery |
| CVE-2024-13951 | 7.6 HIGH | One way hash with predictable salt |
| CVE-2024-13948 | 7.3 HIGH | Insecure Permissions |
| CVE-2024-48850 | 7.2 HIGH | Authenticated Absolute Path Traversal |
| CVE-2024-13928 | 7.2 HIGH | Authenticated SQL Injection |
| CVE-2024-13929 | 7.2 HIGH | Authenticated Servlet Command Injection |
| CVE-2024-13931 | 7.2 HIGH | Authenticated Relative Path Traversal |
| CVE-2024-13946 | 6.8 MEDIUM | Binary Planting / LoadLibrary DLL's not Signed |
| CVE-2024-13949 | 6.8 MEDIUM | Log Forging |
| CVE-2024-13950 | 6.8 MEDIUM | Log Injection |
| CVE-2025-30169 | 6.7 MEDIUM | Admin Authorized File Upload and Execute PHP |
| CVE-2025-30173 | 6.7 MEDIUM | Admin Authorized File Upload |
Showing top 20 of 30 CVEs. View all on vendor page → →
No comments yet