Lucene search

K

CVE-2024-29895

🗓️ 14 May 2024 15:15:17Reported by GitHub_MType 
cve
 cve
🔗 web.nvd.nist.gov👁 59 Views🌐 WEB

Cacti 1.3.x DEV branch command injection vulnerability allows unauthenticated users to execute arbitrary commands

Show more
Related
Detection
Affected
Refs
Paths
ReporterTitlePublishedViews
Family
GithubExploit
Exploit for CVE-2024-29895
17 May 202422:03
githubexploit
GithubExploit
Exploit for CVE-2024-29895
21 May 202412:30
githubexploit
GithubExploit
Exploit for CVE-2024-29895
15 May 202413:11
githubexploit
GithubExploit
Exploit for CVE-2024-29895
16 May 202420:03
githubexploit
GithubExploit
Exploit for CVE-2024-29895
16 May 202406:29
githubexploit
Cvelist
CVE-2024-29895 Cacti command injection in cmd_realtime.php
13 May 202414:33
cvelist
Debian CVE
CVE-2024-29895
14 May 202415:17
debiancve
Vulnrichment
CVE-2024-29895 Cacti command injection in cmd_realtime.php
13 May 202414:33
vulnrichment
UbuntuCve
CVE-2024-29895
14 May 202400:00
ubuntucve
Nuclei
Cacti cmd_realtime.php - Command Injection
16 May 202411:45
nuclei
Rows per page
Vulners
[
  {
    "vendor": "Cacti",
    "product": "cacti",
    "versions": [
      {
        "version": "= 1.3.x DEV",
        "status": "affected"
      }
    ]
  }
]
ParameterPositionPathDescriptionCWE
poller_idquery param/cmd_realtime.phpA command injection vulnerability allows execution of arbitrary commands via the poller_id parameter sourced from user-controlled URL inputs.CWE-77

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
14 May 2024 15:17Current
7.8High risk
Vulners AI Score7.8
CVSS310
EPSS0.00766
SSVC
59
.json
Report