{"vulnerability": "CVE-2024-54146", "sightings": [{"uuid": "3ea9d162-aa1b-420c-9765-9f504cebbade", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54146", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgqmj5oiv62k", "content": "", "creation_timestamp": "2025-01-27T18:55:23.380255Z"}, {"uuid": "82856459-dcb0-4eaa-8420-4ec4bea4299d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54146", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgqgxjbb4y2j", "content": "", "creation_timestamp": "2025-01-27T17:16:00.860803Z"}, {"uuid": "dcaa60f8-5a1f-46fc-9caf-2e6a4875de19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54146", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113989466702722722", "content": "", "creation_timestamp": "2025-02-12T06:20:28.359888Z"}, {"uuid": "aa998b1a-ede5-4cd4-a29b-22742ee19023", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54146", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhxmuiq5qt2z", "content": "", "creation_timestamp": "2025-02-12T07:15:32.531264Z"}, {"uuid": "de2110b4-1fa2-4d3d-9fba-cae39baad017", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54146", "type": "seen", "source": "https://t.me/cvedetector/17832", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26520 - Cacti SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-26520 \nPublished : Feb. 12, 2025, 7:15 a.m. | 1\u00a0hour, 28\u00a0minutes ago \nDescription : Cacti through 1.2.29 allows SQL injection in the template function in host_templates.php via the graph_template parameter. NOTE: this issue exists because of an incomplete fix for CVE-2024-54146. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T10:11:03.000000Z"}, {"uuid": "d00cdc77-6c76-4c9f-be11-74a43a60f8a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54146", "type": "seen", "source": "https://t.me/cvedetector/16501", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54146 - Cacti SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54146 \nPublished : Jan. 27, 2025, 5:15 p.m. | 1\u00a0hour, 22\u00a0minutes ago \nDescription : Cacti is an open source performance and fault management framework. Cacti has a SQL injection vulnerability in the template function of host_templates.php using the graph_template parameter. This vulnerability is fixed in 1.2.29. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T20:11:37.000000Z"}, {"uuid": "2669f280-8ba8-4f92-af32-9b5fd344d9e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54146", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4057", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26520\n\ud83d\udd25 CVSS Score: 7.5 (CVSS_V3)\n\ud83d\udd39 Description: Cacti through 1.2.29 allows SQL injection in the template function in host_templates.php via the graph_template parameter. NOTE: this issue exists because of an incomplete fix for CVE-2024-54146.\n\ud83d\udccf Published: 2025-02-12T09:31:42Z\n\ud83d\udccf Modified: 2025-02-12T09:31:42Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-26520\n2. https://github.com/Cacti/cacti/pull/6096\n3. https://github.com/Cacti/cacti/commit/7fa60c03ad4a69c701ac6b77c85a8927df7acd51", "creation_timestamp": "2025-02-12T10:10:19.000000Z"}, {"uuid": "bd376034-7c42-4fd6-81b2-b0aecffa511f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-54146", "type": "seen", "source": "Telegram/e5Igf34zCxbOOhI7SYsOXH-B3hp5gwu3Znp0Vfb8ELp9bRcd", "content": "", "creation_timestamp": "2025-02-14T10:04:03.000000Z"}]}