{"uuid": "a70af836-2185-415b-8f33-2a50ab4fc961", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-42327", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/1271", "content": "\u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u062a\u0632\u0631\u06cc\u0642 SQL \u0628\u0631\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0628\u062d\u0631\u0627\u0646\u06cc Zabbix - CVE-2024-42327 (CVSS 9.9)\n\n \u0627\u06cc\u0646 \u062a\u0632\u0631\u06cc\u0642 SQL \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0631\u0627 \u0642\u0627\u062f\u0631 \u0628\u0647 \u0627\u0641\u0632\u0627\u06cc\u0634 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a\u060c \u0628\u0647 \u0637\u0648\u0631 \u0628\u0627\u0644\u0642\u0648\u0647 \u0628\u0647 \u062e\u0637\u0631 \u0627\u0646\u062f\u0627\u062e\u062a\u0646 \u0633\u06cc\u0633\u062a\u0645 \u0646\u0638\u0627\u0631\u062a \u0648 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u062f\u0627\u062f\u0647 \u0647\u0627\u06cc \u062d\u0633\u0627\u0633 \u0633\u0627\u0632\u0645\u0627\u0646\u06cc \u06a9\u0646\u062f.\n\n\u0644\u06cc\u0646\u06a9: https://github.com/aramosf/cve-2024-42327\n\nSQL injection Exploit for Critical Zabbix Vulnerability \u2013 CVE-2024-42327 (CVSS 9.9)\n\nThis SQL injection could enable attackers to escalate privileges, potentially compromising the monitoring system and gaining access to sensitive enterprise data.\n\nLink: https://github.com/aramosf/cve-2024-42327", "creation_timestamp": "2024-12-05T10:25:28.000000Z"}