Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| SEH Computertechnik | utnserver Pro | 0 ~ 20.1.22 | - | |
| SEH Computertechnik | utnserver ProMAX | 0 ~ 20.1.22 | - | |
| SEH Computertechnik | INU-100 | 0 ~ 20.1.22 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | SEH utnserver Pro/ProMAX / INU-100 20.1.22 - XSS | https://github.com/fa-rrel/CVE-2024-5420-XSS | POC Details |
| 2 | None | https://github.com/K4yd0/CVE-2024-5420_XSS | POC Details |
| 3 | SEH utnserver Pro/ProMAX / INU-100 20.1.22 - XSS | https://github.com/gh-ost00/CVE-2024-5420-XSS | POC Details |
| 4 | A vulnerability was found in utnserver Pro, utnserver ProMAX, and INU-100 version 20.1.22 and earlier, affecting the device description parameter in the web interface. This flaw allows stored cross-site scripting (XSS), enabling attackers to inject JavaScript code. The attack can be executed remotely by tricking victims into visiting a malicious website, potentially leading to session hijacking. This vulnerability is publicly disclosed and identified as CVE-2024-5420. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-5420.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet