Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-44050 | 9.9 CRITICAL | Heap buffer overflow in CNID daemon comm_rcv() |
| CVE-2026-44047 | 8.8 HIGH | SQL injection in MySQL CNID backend |
| CVE-2026-44048 | 8.8 HIGH | Stack buffer overflow via UCS-2 type confusion in convert_charset() |
| CVE-2026-44051 | 8.1 HIGH | Arbitrary file read via attacker-controlled symlink creation |
| CVE-2026-44068 | 7.6 HIGH | EA path traversal via incomplete sanitization |
| CVE-2026-44062 | 7.5 HIGH | Missing o_len bounds check in pull_charset_flags() |
| CVE-2026-44055 | 7.5 HIGH | Bitwise OR logic bug enables shell injection |
| CVE-2026-44052 | 7.5 HIGH | LDAP simple-bind password exposure in log output |
| CVE-2026-44060 | 7.5 HIGH | Integer underflow in dsi_writeinit() leads to denial of service |
| CVE-2026-44049 | 7.5 HIGH | Out-of-bounds write in convert_charset() null termination |
| CVE-2026-44053 | 7.4 HIGH | Weak cryptography in DHCAST128 UAM |
| CVE-2026-44066 | 7.1 HIGH | Heap out-of-bounds reads in Spotlight RPC unmarshalling |
| CVE-2026-44076 | 6.7 MEDIUM | Shell injection via volume path |
| CVE-2026-44054 | 6.5 MEDIUM | Predictable afpd session token |
| CVE-2026-44058 | 6.4 MEDIUM | Authentication bypass via admin auth user |
| CVE-2026-44056 | 6.0 MEDIUM | Stack buffer overflow in desktop.c |
| CVE-2026-44061 | 5.9 MEDIUM | DES-ECB auth with timing side channel |
| CVE-2026-44063 | 4.2 MEDIUM | LDAP filter injection |
| CVE-2026-44073 | 4.0 MEDIUM | seteuid failure ignored in auth modules |
| CVE-2026-44059 | 3.9 LOW | Non-reentrant privilege toggle |
Showing top 20 of 33 CVEs. View all on vendor page → →
No comments yet