{"vulnerability": "CVE-2020-8813", "sightings": [{"uuid": "f8ddf549-c3b4-4aa3-b662-2a40bc16da87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8813", "type": "seen", "source": "https://t.me/arpsyndicate/186", "content": "#ExploitObserverAlert\n\nCVE-2020-8813\n\nDESCRIPTION: Exploit Observer has 44 entries related to CVE-2020-8813. graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.\n\nFIRST-EPSS: 0.946700000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-11-17T03:11:13.000000Z"}, {"uuid": "527f7e15-ba70-44b6-895a-6c74d5ba8f2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8813", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/12057", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aCVE-2020-8813 - RCE through graph_realtime.php in Cacti 1.2.8\nURL\uff1ahttps://github.com/p0dalirius/CVE-2020-8813-Cacti-RCE-in-graph_realtime\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-01-31T12:09:22.000000Z"}, {"uuid": "91ab38d7-816c-4f5e-a7cc-4405890724c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8813", "type": "published-proof-of-concept", "source": "Telegram/XsaJSl-ZVkDJwW51Zpnf76NX-8q37s98dxz0DAVObJ4Z_Q", "content": "", "creation_timestamp": "2024-09-22T01:52:00.000000Z"}, {"uuid": "b5acaf97-14d1-454f-ab2d-1f0bdb7fe8e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8813", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/2034", "content": "", "creation_timestamp": "2024-09-21T16:06:46.000000Z"}, {"uuid": "7c8450d7-e367-4eae-a44c-787c29da914a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8813", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/18817", "content": "", "creation_timestamp": "2024-09-21T16:06:46.000000Z"}, {"uuid": "d4cd6a43-d749-445d-a51b-02b48f898ee5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8813", "type": "published-proof-of-concept", "source": "https://t.me/BackupLulz/239", "content": "", "creation_timestamp": "2024-11-03T04:41:27.000000Z"}, {"uuid": "ae421dc4-301c-417e-a97b-578293980b8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8813", "type": "published-proof-of-concept", "source": "https://t.me/pwnwiki_zhchannel/176", "content": "CVE-2020-8813 Cacti v1.2.8 RCE\u6f0f\u6d1e\nhttps://www.pwnwiki.org/index.php?title=CVE-2020-8813_Cacti_v1.2.8_RCE%E6%BC%8F%E6%B4%9E", "creation_timestamp": "2021-09-21T06:42:47.000000Z"}, {"uuid": "c4570e89-5f87-4f5d-bbc3-933765c9737b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8813", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/508", "content": "#exploit\n1. CVE-2019-5063,\nCVE-2019-5064:\nBoF vulns in OpenCV\nhttps://blog.talosintelligence.com/2020/01/opencv-buffer-overflow-jan-2020.html\n\n2. CVE-2017-8461:\nWindows RRAS Service MIBEntryGet Overflow\nhttps://packetstormsecurity.com/files/161672/Microsoft-Windows-RRAS-Service-MIBEntryGet-Overflow.html\n\n3. CVE-2020-8813:\nCacti v1.2.8 Pre-Auth\u00a0RCE\nhttps://github.com/mhaskar/CVE-2020-8813", "creation_timestamp": "2024-10-14T21:44:46.000000Z"}, {"uuid": "7ae5cafa-bc17-4dd2-84b1-11935ce45f5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8813", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/527", "content": "#exploit\n1. CVE-2020-8813:\nCacti v1.2.8 RCE Exploit\nhttps://github.com/mhaskar/CVE-2020-8813\n\n2. CVE-2020-35847,\nCVE-2020-35848:\nCockpit CMS NoSQL Injection\nhttps://github.com/w33vils/CVE-2020-35847_CVE-2020-35848", "creation_timestamp": "2024-10-14T21:58:51.000000Z"}]}