Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| owen2345 | camaleon-cms | < 2.8.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | This Python PoC exploits CVE-2024-46987, a Path Traversal bug in Camaleon CMS 2.8.0 < 2.8.2 (work on 2.9.0). It allows authenticated users to read sensitive server files via the MediaController. Intended for authorized security auditing and educational research only. | https://github.com/Goultarde/CVE-2024-46987 | POC Details |
| 2 | Path Traversal vulnerability | https://github.com/L1337Xi/CVE-2024-46987 | POC Details |
| 3 | None | https://github.com/Ik0nw/CVE-2024-46987 | POC Details |
| 4 | Exploit for CVE-2024-46987 | https://github.com/sparrowhawk1113/Exploit-for-CVE-2024-46987 | POC Details |
| 5 | CVE-2024-46987 - Camaleon CMS LFI Exploit | https://github.com/Rival420/CVE-2024-46987 | POC Details |
| 6 | Exploit created using Python | https://github.com/advaitpathak21/CVE-2024-46987 | POC Details |
| 7 | This Rust PoC exploits CVE-2024-46987, a Path Traversal bug in Camaleon CMS 2.8.0 < 2.8.2 (work on 2.9.0). | https://github.com/rabouzia/CVE-2024-46987 | POC Details |
| 8 | PoC exploit for CVE-2024-46987 — Camaleon CMS arbitrary path traversal (file read) | https://github.com/BLUEBERRYP1LL/CVE-2024-46987 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet