Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A Boolean-based SQL injection vulnerability in the "RHUB TurboMeeting" web application. This vulnerability could allow an attacker to execute arbitrary SQL commands on the database server, potentially allowing them to access sensitive data or compromise the server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-38289.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-41706 | 7.3 HIGH | Archer Platform 安全漏洞 |
| CVE-2024-41705 | 7.1 HIGH | Archer Platform 安全漏洞 |
| CVE-2024-41707 | 4.8 MEDIUM | Archer Platform 安全漏洞 |
| CVE-2024-41473 | Tenda FH1201 安全漏洞 | |
| CVE-2024-41468 | Tenda FH1201 安全漏洞 | |
| CVE-2024-38287 | RHUB TurboMeeting 安全漏洞 | |
| CVE-2024-38288 | RHUB TurboMeeting 安全漏洞 | |
| CVE-2024-40318 | Webkul QloApps 安全漏洞 | |
| CVE-2024-40324 | E-Staff 安全漏洞 | |
| CVE-2024-36542 | Kuma 安全漏洞 |
No comments yet