Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Cassandra | 3.0.0 ~ unspecified | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Automated PoC of CVE-2021-44521 | https://github.com/WoodenKlaas/CVE-2021-44521 | POC Details |
| 2 | full PoC of CVE-2021-44521 | https://github.com/Yeyvo/poc-CVE-2021-44521 | POC Details |
| 3 | When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE. | https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2021/CVE-2021-44521.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-24289 | Deserialization of untrusted data in the Hessian Component of Apache Cayenne 4.1 with olde | |
| CVE-2022-24112 | apisix/batch-requests plugin allows overwriting the X-REAL-IP header |
No comments yet