Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Detection Artefact Generator for Dell UnityVSA CVE-2025-36604 | https://github.com/watchtowrlabs/watchTowr-vs-Dell-UnityVSA-PreAuth-CVE-2025-36604 | POC Details |
| 2 | Dell Unity, version(s) 5.5 and prior, contains an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-36604.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-36594 | 9.8 CRITICAL | Dell PowerProtect Data Domain 安全漏洞 |
| CVE-2025-26476 | 8.4 HIGH | Dell ECS 安全漏洞 |
| CVE-2025-21120 | 8.3 HIGH | Dell Avamar 安全漏洞 |
| CVE-2025-30099 | 7.8 HIGH | Dell PowerProtect Data Domain 操作系统命令注入漏洞 |
| CVE-2025-36607 | 7.8 HIGH | Dell Unity 操作系统命令注入漏洞 |
| CVE-2025-36606 | 7.8 HIGH | Dell Unity 操作系统命令注入漏洞 |
| CVE-2025-38741 | 7.5 HIGH | Dell Enterprise SONiC OS 安全漏洞 |
| CVE-2025-38739 | 7.2 HIGH | Dell Digital Delivery 安全漏洞 |
| CVE-2025-30098 | 6.7 MEDIUM | Dell PowerProtect Data Domain 操作系统命令注入漏洞 |
| CVE-2025-30097 | 6.7 MEDIUM | Dell PowerProtect Data Domain 操作系统命令注入漏洞 |
| CVE-2025-30096 | 6.7 MEDIUM | Dell PowerProtect Data Domain 操作系统命令注入漏洞 |
| CVE-2025-36605 | 6.1 MEDIUM | Dell Unity 跨站脚本漏洞 |
No comments yet