Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/refr4g/CVE-2024-51378 | POC Details |
| 2 | A Python script to scan websites for the CVE-2024-51378 vulnerability. | https://github.com/i0x29A/CVE-2024-51378 | POC Details |
| 3 | None | https://github.com/qnole000/CVE-2024-51378 | POC Details |
| 4 | CyberPanel contains a command injection vulnerability in the /ftp/getresetstatus and /dns/getresetstatus endpoints.The vulnerability exists due to improper validation of the 'statusfile' parameter, which is directly used in a shell command.The security middleware only validates POST requests, allowing attackers to bypass protection using OPTIONS requests. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-51378.yaml | POC Details |
| 5 | Exploit cyberpanel version 2.3.6 - 2.3.7 | https://github.com/rimbadirgantara/CVE-2024-51378 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet