Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| salesagility | SuiteCRM | < 7.14.4 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Tool for validating / testing CVE-2024-36416 | https://github.com/kva55/CVE-2024-36416 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-36412 | 10.0 CRITICAL | SuiteCRM unauthenticated SQL Injection |
| CVE-2024-36409 | 9.6 CRITICAL | SuiteCRM authenticated SQL Injection in TreeData entrypoint |
| CVE-2024-36411 | 9.6 CRITICAL | SuiteCRM authenticated SQL Injection in EmailUIAjax displayView controller |
| CVE-2024-36408 | 9.6 CRITICAL | SuiteCRM authenticated SQL Injection in Alerts |
| CVE-2024-36410 | 9.6 CRITICAL | SuiteCRM authenticated SQL Injection in EmailUIAjax messages count controller |
| CVE-2024-36415 | 9.1 CRITICAL | SuiteCRM Improper Control of Filename for Include Statement in PHP and Unrestricted Upload |
| CVE-2024-36413 | 8.9 HIGH | SuiteCRM authenticated Reflected Cross-Site Scripting |
| CVE-2024-36418 | 8.6 HIGH | SuiteCRM authenticated RCE using connectors |
| CVE-2024-36414 | 7.7 HIGH | SuiteCRM authenticated Server-Side Request Forgery |
| CVE-2024-36417 | 5.7 MEDIUM | SuiteCRM Stored XSS Vulnerability Allows Code Execution via Malicious iFrame |
| CVE-2024-36406 | 5.4 MEDIUM | SuiteCRM vulnerable to open redirects |
| CVE-2024-36419 | 4.3 MEDIUM | SuiteCRM-Core Host Header Injection in /legacy |
| CVE-2024-36407 | 3.7 LOW | SuiteCRM unauthenticated user password reset on php7 |
No comments yet