尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| owen2345 | camaleon-cms | < 2.8.2 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | This Python PoC exploits CVE-2024-46987, a Path Traversal bug in Camaleon CMS 2.8.0 < 2.8.2 (work on 2.9.0). It allows authenticated users to read sensitive server files via the MediaController. Intended for authorized security auditing and educational research only. | https://github.com/Goultarde/CVE-2024-46987 | POC详情 |
| 2 | Path Traversal vulnerability | https://github.com/L1337Xi/CVE-2024-46987 | POC详情 |
| 3 | None | https://github.com/Ik0nw/CVE-2024-46987 | POC详情 |
| 4 | Exploit for CVE-2024-46987 | https://github.com/sparrowhawk1113/Exploit-for-CVE-2024-46987 | POC详情 |
| 5 | CVE-2024-46987 - Camaleon CMS LFI Exploit | https://github.com/Rival420/CVE-2024-46987 | POC详情 |
| 6 | Exploit created using Python | https://github.com/advaitpathak21/CVE-2024-46987 | POC详情 |
| 7 | This Rust PoC exploits CVE-2024-46987, a Path Traversal bug in Camaleon CMS 2.8.0 < 2.8.2 (work on 2.9.0). | https://github.com/rabouzia/CVE-2024-46987 | POC详情 |
| 8 | PoC exploit for CVE-2024-46987 — Camaleon CMS arbitrary path traversal (file read) | https://github.com/BLUEBERRYP1LL/CVE-2024-46987 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论