Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | MajorDoMo contains a reflected XSS caused by unsanitized $qry parameter in command.php, letting attackers inject arbitrary JavaScript via crafted URLs, exploit requires victim to visit malicious URL. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2026/CVE-2026-27176.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2026-27180 | 9.8 CRITICAL | MajorDoMo Supply Chain Remote Code Execution via Update URL Poisoning |
| CVE-2026-27175 | 9.8 CRITICAL | MajorDoMo Command Injection in rc/index.php via Race Condition |
| CVE-2026-27174 | 9.8 CRITICAL | MajorDoMo Unauthenticated Remote Code Execution via Admin Console Eval |
| CVE-2026-27179 | 8.2 HIGH | MajorDoMo Unauthenticated SQL Injection in Commands Module |
| CVE-2026-27181 | 7.5 HIGH | MajorDoMo Unauthenticated Module Uninstall via Market Endpoint |
| CVE-2026-27177 | 7.2 HIGH | MajorDoMo Stored Cross-Site Scripting via Property Set Endpoint |
| CVE-2026-27178 | 7.2 HIGH | MajorDoMo Stored Cross-Site Scripting via Method Parameters to Shoutbox |
No comments yet