Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| ABB | ASPECT-Enterprise | 0 ~ 3.* | - | |
| ABB | NEXUS Series | 0 ~ 3.* | - | |
| ABB | MATRIX Series | 0 ~ 3.* | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-2410 | 9.1 CRITICAL | Admin Authorized Port (iptables) manipulation (open/close/disable ports) |
| CVE-2025-2409 | 9.1 CRITICAL | Admin Authorized System File corruption |
| CVE-2024-48853 | 9.0 CRITICAL | Authenticated Escalation to guest to root |
| CVE-2025-30171 | 9.0 CRITICAL | Admin Authorized System File Deletion |
| CVE-2024-13955 | 8.8 HIGH | SQL Injection 2nd Order |
| CVE-2024-13952 | 8.4 HIGH | Remote Code Execution |
| CVE-2024-9639 | 8.0 HIGH | Authenticated Remote Code Execution |
| CVE-2025-30172 | 8.0 HIGH | Admin Authorized Remote Code Execution |
| CVE-2024-13957 | 7.6 HIGH | SSRF Server Side Request Forgery |
| CVE-2024-13951 | 7.6 HIGH | One way hash with predictable salt |
| CVE-2024-13948 | 7.3 HIGH | Insecure Permissions |
| CVE-2024-48850 | 7.2 HIGH | Authenticated Absolute Path Traversal |
| CVE-2024-13931 | 7.2 HIGH | Authenticated Relative Path Traversal |
| CVE-2024-13929 | 7.2 HIGH | Authenticated Servlet Command Injection |
| CVE-2024-13928 | 7.2 HIGH | Authenticated SQL Injection |
| CVE-2024-13949 | 6.8 MEDIUM | Log Forging |
| CVE-2024-13946 | 6.8 MEDIUM | Binary Planting / LoadLibrary DLL's not Signed |
| CVE-2024-13950 | 6.8 MEDIUM | Log Injection |
| CVE-2025-30169 | 6.7 MEDIUM | Admin Authorized File Upload and Execute PHP |
| CVE-2024-13956 | 6.7 MEDIUM | SSL Verification Bypass |
Showing top 20 of 30 CVEs. View all on vendor page → →
No comments yet