Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Unitronics | Unistream Unilogic | All versions ~ 1.35.227 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2024-27767 | 10.0 CRITICAL | Unitronics Unistream Unilogic – Versions prior to 1.35.227 CWE-287: Improper Authenticati |
| CVE-2024-27769 | 8.8 HIGH | Unitronics Unistream Unilogic – Versions prior to 1.35.227 CWE-200: Exposure of Sensitive |
| CVE-2024-27771 | 8.8 HIGH | Unitronics Unistream Unilogic – Versions prior to 1.35.227 CWE-22: 'Path Traversal' |
| CVE-2024-27773 | 8.8 HIGH | Unitronics Unistream Unilogic – Versions prior to 1.35.227 CWE-348: Use of Less Trusted S |
| CVE-2024-27770 | 8.8 HIGH | Unitronics Unistream Unilogic – Versions prior to 1.35.227 CWE-23: Relative Path Traversa |
| CVE-2024-27772 | 8.8 HIGH | Unitronics Unistream Unilogic – Versions prior to 1.35.227 CWE-78: 'OS Command Injection' |
| CVE-2024-27774 | 7.5 HIGH | Unitronics Unistream Unilogic – Versions prior to 1.35.227 CWE-259: Use of Hard-coded Pas |
No comments yet