{"uuid": "a47eec21-3cb8-40d1-a40d-55df2860dcba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-42327", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/2471", "content": "#exploit\n1. CVE-2024-12425,\nCVE-2024-12426:\nLibreOffice Path Traversal\nhttps://codeanlabs.com/blog/general/exploiting-libreoffice-cve-2024-12425-and-cve-2024-12426\n\n2. CVE-2024-36412:\nUsing XSS filters against XSS filters - Unexpected SQLI/RCE\nhttps://secarius.fr/cves/cve_2024_36412_using_filters_against_filters_unexpected_sql_injection\n\n3. CVE-2024-42327:\nZabbix Privilege Escalation -&gt; RCE\nhttps://github.com/godylockz/CVE-2024-42327", "creation_timestamp": "2025-02-20T05:23:47.000000Z"}