Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-2204
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Zemana AntiLogger v2.74.204.664 - Denial of Service (DoS)
Source: NVD (National Vulnerability Database)
Vulnerability Description
Zemana AntiLogger v2.74.204.664 is vulnerable to a Denial of Service (DoS) vulnerability by triggering the 0x80002004 and 0x80002010 IOCTL codes of the zam64.sys and zamguard64.sys drivers.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
空指针解引用
Source: NVD (National Vulnerability Database)
Vulnerability Title
Zemana AntiLogger 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Zemana AntiLogger是Zemana公司的一款应用程序。可保护您的 PC 免受键盘记录器、恶意软件、勒索软件、广告软件等的侵害。 Zemana AntiLogger v2.74.204.664版本存在代码问题漏洞,该漏洞源于允许攻击者通过触发zam64.sys和zamguard64.sys驱动程序的0x80002004和0x80002010 IOCTL代码导致拒绝服务(DOS)。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
ZemanaAntiLogger 2.74.204.664 -
II. Public POCs for CVE-2024-2204
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-2204
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-2204

No comments yet


Leave a comment