Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | NocoDB任意文件读取CVE-2023-35843 | https://github.com/Lserein/CVE-2023-35843 | POC Details |
| 2 | CVE-2023-35843 NocoDB 任意文件读取漏洞 | https://github.com/b3nguang/CVE-2023-35843 | POC Details |
| 3 | NocoDB through 0.106.1 has a path traversal vulnerability that allows an unauthenticated attacker to access arbitrary files on the server by manipulating the path parameter of the /download route. This vulnerability could allow an attacker to access sensitive files and data on the server, including configuration files, source code, and other sensitive information. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-35843.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet