Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | IdeaCMS | 1.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | IdeaCMS up to 1.7 is vulnerable to SQL injection via the field parameter in article and product query interfaces. This template uses a time-based payload to safely detect the vulnerability. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-5569.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-5552 | 6.3 MEDIUM | ChestnutCMS API Endpoint exec deserialization |
| CVE-2025-27811 | Razer Synapse 4 安全漏洞 | |
| CVE-2025-23101 | SAMSUNG Exynos 1380 安全漏洞 | |
| CVE-2025-23096 | SAMSUNG多款产品 安全漏洞 | |
| CVE-2025-23095 | SAMSUNG多款产品 安全漏洞 | |
| CVE-2025-29093 | Motivian Content Mangment System 安全漏洞 | |
| CVE-2025-23106 | SAMSUNG Exynos 2400、SAMSUNG Exynos 2200和SAMSUNG Exynos 1480 安全漏洞 | |
| CVE-2025-29094 | Motivian Content Mangment System 安全漏洞 | |
| CVE-2025-46204 | Unifiedtransform 安全漏洞 | |
| CVE-2025-46203 | Unifiedtransform 安全漏洞 | |
| CVE-2025-46011 | listmonk 安全漏洞 |
No comments yet