Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Time Based SQL Injection in Zabbix Server Audit Log --> RCE | https://github.com/W01fh4cker/CVE-2024-22120-RCE | POC Details |
| 2 | This is my exploit for CVE-2024-22120, which involves an SSRF vulnerability inside an XXE with a Gopher payload. | https://github.com/g4nkd/CVE-2024-22120-RCE-with-gopher | POC Details |
| 3 | This is my exploit for CVE-2024-22120, which involves an SSRF vulnerability inside an XXE with a Gopher payload. | https://github.com/isPique/CVE-2024-22120-RCE-with-gopher | POC Details |
| 4 | The Zabbix server can execute commands for configured scripts. After executing a command, an audit entry is added to the "Audit Log". Due to the "clientip" field not being sanitized, it is possible to inject SQL into "clientip" and exploit a time-based blind SQL injection vulnerability. | https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2024/CVE-2024-22120.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet