Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-52763

EPSS 0.60% · P70
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-52763

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A cross-site scripting (XSS) vulnerability in the component /graph_all_periods.php of Ganglia-web v3.73 to v3.75 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the "g" parameter.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Ganglia 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Ganglia是一套用于高性能计算系统、群集和网络的可扩展的分布式监视工具。该产品主要用于查看实时或记录的监控数据。 Ganglia v3.73至v3.75版本存在安全漏洞,该漏洞源于容易受到跨站脚本攻击,攻击者可通过向参数中注入精心设计的有效载荷来执行任意Web脚本或HTML。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2024-52763

#POC DescriptionSource LinkShenlong Link
1A cross-site scripting (XSS) vulnerability in the component /graph_all_periods.php of Ganglia-web v3.73 to v3.75 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the "g" parameter. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-52763.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-52763

登录查看更多情报信息。

Same Patch Batch · n/a · 2024-11-19 · 15 CVEs total

CVE-2024-215397.5 HIGHESLint Rewrite 安全漏洞
CVE-2024-52711D-Link DI-8100 安全漏洞
CVE-2024-52675SourceCodester Sentiment Based Movie Rating System 安全漏洞
CVE-2024-48071Weaver e-cology 安全漏洞
CVE-2024-48069Weaver e-cology 安全漏洞
CVE-2024-48072Weaver e-cology 安全漏洞
CVE-2024-48694Daxi OfficeWeb365 安全漏洞
CVE-2024-48070Weaver e-cology 安全漏洞
CVE-2024-50803Redaxo 安全漏洞
CVE-2024-52788Tenda W9 安全漏洞
CVE-2024-52714Tenda AC6 安全漏洞
CVE-2024-52762Ganglia 安全漏洞
CVE-2024-52759D-Link DI-8003 安全漏洞
CVE-2024-52789Tenda W30E 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2024-52763

No comments yet


Leave a comment