Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Python PoC for CVE-2020-35846 targeting Cockpit 0.11.1 | https://github.com/JohnHammond/CVE-2020-35846 | POC Details |
| 2 | Cockpit CMS 0.11.1 NoSQL Injection to Remote Code Execution | https://github.com/0z09e/CVE-2020-35846 | POC Details |
| 3 | A simple workflow that runs all Agentejo Cockpit related nuclei templates on a given target. | https://github.com/projectdiscovery/nuclei-templates/blob/main/workflows/cockpit-workflow.yaml | POC Details |
| 4 | Agentejo Cockpit before 0.11.2 allows NoSQL injection via the Controller/Auth.php check function. The $eq operator matches documents where the value of a field equals the specified value. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-35846.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet