从这个网页截图中,可以获取到以下关于漏洞的关键信息: 1. 漏洞编号:ZBX-25629 2. 漏洞描述:Heap buffer over-read in str_base64_encode_rfc2047 (CVE-2024-42333) 3. 类型:Defect (Security) 4. 优先级:Trivial 5. 影响版本:None 6. 组件:Server (S) 7. 修复版本:6.0.34rc1, ... 8. 报告人:Vjaceslav Bogdanovs 9. 投票:0 10. 状态:Closed 11. 创建时间:2天前 13:59 12. 更新时间:昨天 12:47 13. 解决时间:2天前 14:01 14. 链接到Zabbix ID:https://support.zabbix.com/browse/ZBX-25629 15. MITRE ID:CVE-2024-42333 16. CVSS分值:2.7 17. CVSS向量:https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/R:L/ /C:L/ /I:N/ /A:S 18. 严重性:Low 19. 摘要:Heap buffer over-read 20. 描述:It is possible to leak a small amount of Zabbix Server memory using read in src/libs/zbxmedia/email.c 21. CWE编号:CWE-126 Buffer Over-read 22. CAPEC编号:CAPEC-679 Exploitation of Improperly Configured or Implementec 23. 已知攻击向量**:Potential denial of service, limited read of memory data