Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2024-42327 | 9.9 CRITICAL | SQL injection in user.get API |
| CVE-2024-42330 | 9.1 CRITICAL | JS - Internal strings in HTTP headers |
| CVE-2024-36467 | 7.5 HIGH | Authentication privilege escalation via user groups due to missing authorization checks |
| CVE-2024-42326 | 4.4 MEDIUM | Use after free vulnerability in browser.c |
| CVE-2024-42332 | 3.7 LOW | New line injection in Zabbix SNMP traps |
| CVE-2024-42328 | 3.3 LOW | JS - Crash on empty HTTP server response |
| CVE-2024-42329 | 3.3 LOW | JS - Crash on unexpected HTTP server response |
| CVE-2024-36468 | 3.0 LOW | Stack buffer overflow in zbx_snmp_cache_handle_engineid |
| CVE-2024-36464 | 2.7 LOW | Media Types: Office365, SMTP passwords are unencrypted and visible in plaintext when expor |
| CVE-2024-42333 | 2.7 LOW | Heap buffer over-read |
No comments yet