{"uuid": "274b212e-4276-4ebb-b1c6-28b0ec4eba6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24367", "type": "seen", "source": "https://t.me/cvedetector/16486", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24367 - Cacti Remote Code Execution (RCE)\", \n  \"Content\": \"CVE ID : CVE-2025-24367 \nPublished : Jan. 27, 2025, 6:15 p.m. | 22\u00a0minutes ago \nDescription : Cacti is an open source performance and fault management framework. An authenticated Cacti user can abuse graph creation and graph template functionality to create arbitrary PHP scripts in the web root of the application, leading to remote code execution on the server. This vulnerability is fixed in 1.2.29. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T20:11:17.000000Z"}