Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Veeam | Backup and Recovery | 12.1.2 ~ 12.1.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Pre-Auth Exploit for CVE-2024-40711 | https://github.com/watchtowrlabs/CVE-2024-40711 | POC Details |
| 2 | CVE-2024-40711-exp | https://github.com/realstatus/CVE-2024-40711-Exp | POC Details |
| 3 | CVE-2024-40711 是 Veeam Backup & Replication 软件中的一个严重漏洞,允许未经身份验证的攻击者远程执行代码。 | https://github.com/XiaomingX/CVE-2024-40711-poc | POC Details |
| 4 | CVE-2024-40711 是 Veeam Backup & Replication 软件中的一个严重漏洞,允许未经身份验证的攻击者远程执行代码。 | https://github.com/XiaomingX/cve-2024-40711-poc | POC Details |
| 5 | A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE). | https://github.com/projectdiscovery/nuclei-templates/blob/main/passive/cves/2024/CVE-2024-40711.yaml | POC Details |
| 6 | A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE). | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-40711.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet