Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| ZoneMinder | zoneminder | < 1.36.33 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Unauthenticated RCE in ZoneMinder Snapshots - Poc Exploit | https://github.com/rvizx/CVE-2023-26035 | POC Details |
| 2 | POC script for CVE-2023-26035 (zoneminder 1.36.32) | https://github.com/heapbytes/CVE-2023-26035 | POC Details |
| 3 | ZoneMinder Snapshots - Unauthenticated | https://github.com/Yuma-Tsushima07/CVE-2023-26035 | POC Details |
| 4 | Exploit for CVE-2023-26035 affecting ZoneMinder < 1.36.33 and < 1.37.33 | https://github.com/Faelian/zoneminder_CVE-2023-26035 | POC Details |
| 5 | None | https://github.com/srinathkarli7/CVE-2023-26035-exploit.sh.sh.sh | POC Details |
| 6 | This is a script written in Python that allows the exploitation of the Zoneminder's security flaw described in CVE-2023-26035. | https://github.com/m3m0o/zoneminder-snapshots-rce-poc | POC Details |
| 7 | Exploit for CVE-2023-26035 affecting ZoneMinder < 1.36.33 and < 1.37.33 | https://github.com/0xfalafel/zoneminder_CVE-2023-26035 | POC Details |
| 8 | ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras.Versions prior to 1.36.33 and 1.37.33 are vulnerable to Unauthenticated Remote Code Execution via Missing Authorization. There are no permissions check on the snapshot action, which expects an id to fetch an existing monitor but can be passed an object to create a new one instead. TriggerOn ends up calling shell_exec using the supplied Id. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-26035.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet