Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | The Certificate Signing Request (CSR) feature in the admin portal of the application is vulnerable to command injection. This vulnerability could allow authenticated admin users to execute arbitrary commands on the underlying server by injecting malicious input into the CSR generation process. The application failed to properly sanitize user-supplied input before using it in a command executed privileges. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-38288.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-41706 | 7.3 HIGH | Archer Platform 安全漏洞 |
| CVE-2024-41705 | 7.1 HIGH | Archer Platform 安全漏洞 |
| CVE-2024-41707 | 4.8 MEDIUM | Archer Platform 安全漏洞 |
| CVE-2024-41473 | Tenda FH1201 安全漏洞 | |
| CVE-2024-41468 | Tenda FH1201 安全漏洞 | |
| CVE-2024-38287 | RHUB TurboMeeting 安全漏洞 | |
| CVE-2024-38289 | RHUB TurboMeeting 安全漏洞 | |
| CVE-2024-40318 | Webkul QloApps 安全漏洞 | |
| CVE-2024-40324 | E-Staff 安全漏洞 | |
| CVE-2024-36542 | Kuma 安全漏洞 |
No comments yet