Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| ABB | ASPECT-Enterprise | 0 ~ 3.08.02 | - | |
| ABB | NEXUS Series | initial ~ 3.08.02 | - | |
| ABB | MATRIX Series | 0 ~ 3.08.02 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2024-51555 | 10.0 CRITICAL | Force Change of Default Credentials |
| CVE-2024-51551 | 10.0 CRITICAL | Default Credentials |
| CVE-2024-51550 | 10.0 CRITICAL | Data Validation / Sanitization |
| CVE-2024-51549 | 10.0 CRITICAL | Absolute Path Traversal |
| CVE-2024-51545 | 10.0 CRITICAL | Username Enumeration |
| CVE-2024-11317 | 10.0 CRITICAL | PHP Session Fixation |
| CVE-2024-48839 | 10.0 CRITICAL | Remote Code Execution, RCE |
| CVE-2024-48840 | 10.0 CRITICAL | Unauthorized Access |
| CVE-2024-51548 | 9.9 CRITICAL | Dangerous File Upload |
| CVE-2024-6784 | 9.9 CRITICAL | SSRF Server Side Request Forgery |
| CVE-2024-6515 | 9.6 CRITICAL | unauthorized file access |
| CVE-2024-48845 | 9.4 CRITICAL | Weak Password Rules/Strength |
| CVE-2024-51554 | 9.1 CRITICAL | off-by-one-error |
| CVE-2024-6516 | 9.0 CRITICAL | Cross Site Scripting XSS |
| CVE-2024-48847 | 8.2 HIGH | MD5 bypass operation |
| CVE-2024-51541 | 8.2 HIGH | Local File Inclusion |
| CVE-2024-51542 | 8.2 HIGH | Configuration Download |
| CVE-2024-51543 | 8.2 HIGH | Information Disclosure |
| CVE-2024-51544 | 8.2 HIGH | Service Control |
| CVE-2024-48843 | 7.7 HIGH | Denial of Service, DoS |
Showing top 20 of 24 CVEs. View all on vendor page → →
No comments yet