Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Writeup and POC for CVE-2022-23134 | https://github.com/TheN00bBuilder/cve-2022-23134-poc-and-writeup | POC Details |
| 2 | After the initial setup process, some steps of setup.php file are reachable not only by super-administrators but also by unauthenticated users. A malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-23134.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-23131 | 9.1 CRITICAL | Unsafe client-side session storage leading to authentication bypass/instance takeover via |
| CVE-2022-23133 | 6.3 MEDIUM | Stored XSS in host groups configuration window in Zabbix Frontend |
| CVE-2022-23132 | 3.3 LOW | Incorrect permissions of [/var/run/zabbix] forces dac_override |
No comments yet