Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2024-29895 | 10.0 CRITICAL | Cacti command injection in cmd_realtime.php |
| CVE-2024-25641 | 9.1 CRITICAL | Cacti RCE vulnerability when importing packages |
| CVE-2024-34340 | 9.1 CRITICAL | Authentication Bypass when using using older password hashes |
| CVE-2024-31459 | 8.1 HIGH | Cacti RCE vulnerability by file include in lib/plugin.php |
| CVE-2024-27082 | 7.6 HIGH | Cacti Cross-site Scripting vulnerability when managing trees |
| CVE-2024-31460 | 6.5 MEDIUM | Cacti SQL Injection vulnerability in lib/api_automation.php caused by reading dirty data s |
| CVE-2024-30268 | 6.1 MEDIUM | Cacti XSS vulnerability in display_settings |
| CVE-2024-31443 | 5.7 MEDIUM | Cacti XSS vulnerability in lib/html_tree.php by reading dirty data stored in database |
| CVE-2024-29894 | 5.4 MEDIUM | Cacti Cross-site Scripting vulnerability when using JavaScript based messaging API |
| CVE-2024-31458 | 4.6 MEDIUM | Cacti SQL Injection vulnerability in lib/html_form_templates.php by reading dirty data sto |
| CVE-2024-31444 | 4.6 MEDIUM | Cacti XSS vulnerability in lib/html.php by reading dirty data stored in database |
No comments yet