Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2024-45519 unauthenticated OS commoand Injection in Zimbra prior to 8.8.15***. | https://github.com/TOB1a3/CVE-2024-45519-PoC | POC Details |
| 2 | None | https://github.com/p33d/CVE-2024-45519 | POC Details |
| 3 | Zimbra - Remote Command Execution (CVE-2024-45519) | https://github.com/Chocapikk/CVE-2024-45519 | POC Details |
| 4 | None | https://github.com/whiterose7777/CVE-2024-45519 | POC Details |
| 5 | None | https://github.com/XiaomingX/cve-2024-45519-poc | POC Details |
| 6 | Zimbra CVE-2024-45519 | https://github.com/sec13b/CVE-2024-45519 | POC Details |
| 7 | SMTP-based vulnerability in the PostJournal service of Zimbra Collaboration Suite that allows unauthenticated attackers to inject arbitrary commands. This vulnerability arises due to improper sanitization of SMTP input, enabling attackers to craft malicious SMTP messages that execute commands under the Zimbra user context. Successful exploitation can lead to unauthorized access, privilege escalation, and potential compromise of the affected system's integrity and confidentiality. | https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2024/CVE-2024-45519.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet