从这个网页截图中,可以获取到以下关于漏洞的关键信息: 1. 漏洞编号:CVE-2024-36463 2. 漏洞类型:Defect (Security) 3. 优先级:Minor 4. 影响版本:None 5. 组件:Proxy (P), Server (S) 6. 描述:The implementation of atob in "Zabbix JS" allows to create a string with arbitrary content and use it to access internal properties of objects. 7. Mitre ID:CVE-2024-36463 8. CVSS 分数:6.5 9. CVSS 向量:https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/R:L/ 10. 严重性:Medium 11. 摘要:JS - "atob" function allows to create private strings 12. 漏洞分类: - Common Weakness Enumeration (CWE):CWE-767 Access to Critical Private Variable via Public Method - Common Attack Pattern Enumeration and Classification (CAPEC):CAPEC-253 Remote Code Inclusion 13. 已知攻击向量:A successful exploit would result in arbitrary code execution. 14. 创建时间:1 小时前 15. 更新时间:1 小时前 16. 解决时间:1 小时前 17. 报告人:Vjaceslav Bogdanovs 18. 负责人:Zabbix Support Team 19. 投票:0 20. 关注者:1