Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | By leaking a target device's serial number, a remote attacker can generate the target device's default administrator password. The target device may leak its serial number via unauthenticated HTTP, HTTPS, IPP, SNMP, or PJL requests. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-51978.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-51982 | 7.5 HIGH | Unauthenticated Denial of Service (DoS) via malformed PJL request affecting multiple model |
| CVE-2024-51983 | 7.5 HIGH | Unauthenticated Denial of Service (DoS) via malformed WS-Scan request affecting multiple m |
| CVE-2024-51979 | 7.2 HIGH | Authenticated stack based buffer overflow affecting multiple models from Brother Industrie |
| CVE-2024-51984 | 6.8 MEDIUM | Authenticated disclosure of external service passwords via pass-back attack affecting mult |
| CVE-2024-51981 | 5.3 MEDIUM | Unauthenticated Server Side Request Forgery (SSRF) via WS-Eventing affecting multiple mode |
| CVE-2024-51977 | 5.3 MEDIUM | Unauthenticated leak of sensitive information affecting multiple models from Brother Indus |
| CVE-2024-51980 | 5.3 MEDIUM | Unauthenticated Server Side Request Forgery (SSRF) via WS-Addressing affecting multiple mo |
No comments yet