Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | cve-2024-42327 ZBX-25623 | https://github.com/aramosf/cve-2024-42327 | POC Details |
| 2 | PoC for CVE-2024-42327 / ZBX-25623 | https://github.com/compr00t/CVE-2024-42327 | POC Details |
| 3 | None | https://github.com/depers-rus/CVE-2024-42327 | POC Details |
| 4 | POC for CVE-2024-42327, an authenticated SQL Injection in Zabbix through the user.get API Method | https://github.com/watchdog1337/CVE-2024-42327_Zabbix_SQLI | POC Details |
| 5 | None | https://github.com/itform-fr/Zabbix---CVE-2024-42327 | POC Details |
| 6 | writeup cve-2024-42327 | https://github.com/igorbf495/CVE-2024-42327 | POC Details |
| 7 | None | https://github.com/BridgerAlderson/Zabbix-CVE-2024-42327 | POC Details |
| 8 | Zabbix CVE-2024-42327 PoC | https://github.com/BridgerAlderson/Zabbix-CVE-2024-42327-SQL-Injection-RCE | POC Details |
| 9 | POC for CVE-2024-42327: Zabbix Privilege Escalation -> RCE | https://github.com/godylockz/CVE-2024-42327 | POC Details |
| 10 | This is for educational porpuses only. Please do not use agains unathorized systems. | https://github.com/874anthony/CVE-2024-42327_Zabbix_SQLi | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-42330 | 9.1 CRITICAL | JS - Internal strings in HTTP headers |
| CVE-2024-36467 | 7.5 HIGH | Authentication privilege escalation via user groups due to missing authorization checks |
| CVE-2024-42326 | 4.4 MEDIUM | Use after free vulnerability in browser.c |
| CVE-2024-42332 | 3.7 LOW | New line injection in Zabbix SNMP traps |
| CVE-2024-42328 | 3.3 LOW | JS - Crash on empty HTTP server response |
| CVE-2024-42331 | 3.3 LOW | Use after free in browser_push_error |
| CVE-2024-42329 | 3.3 LOW | JS - Crash on unexpected HTTP server response |
| CVE-2024-36468 | 3.0 LOW | Stack buffer overflow in zbx_snmp_cache_handle_engineid |
| CVE-2024-36464 | 2.7 LOW | Media Types: Office365, SMTP passwords are unencrypted and visible in plaintext when expor |
| CVE-2024-42333 | 2.7 LOW | Heap buffer over-read |
No comments yet