Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Progress Software | LoadMaster | 7.2.48.1 ~ 7.2.48.10 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Unauthenticated Command Injection In Progress Kemp LoadMaster | https://github.com/Chocapikk/CVE-2024-1212 | POC Details |
| 2 | None | https://github.com/MuhammadWaseem29/CVE-2024-1212 | POC Details |
| 3 | None | https://github.com/hack-with-rohit/CVE-2024-1212 | POC Details |
| 4 | None | https://github.com/nak000/CVE-2024-1212 | POC Details |
| 5 | Demonstrating the exploitation of the Remote Code Execution (RCE) vulnerability in Kemp LoadMaster (CVE-2024-1212). This project covers reconnaissance, vulnerability scanning using Nuclei, and exploitation processes, while also highlighting mitigation strategies to secure affected systems | https://github.com/Rehan07-Human/Exploiting-RCE-Cyber_Project_CVE-2024-1212 | POC Details |
| 6 | Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-1212.yaml | POC Details |
| 7 | None | https://github.com/r0otk3r/CVE-2024-1212 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet