Show filters
455 Total Results
Displaying 31-40 of 455
Sort by:
Attacker Value
Unknown
CVE-2024-11317
Disclosure Date: December 05, 2024 (last updated December 21, 2024)
Session Fixation vulnerabilities allow an attacker to fix a users session identifier before login providing an opportunity for session takeover on a product.
Affected products:
ABB ASPECT - Enterprise v3.08.02;
NEXUS Series v3.08.02;
MATRIX Series v3.08.02
0
Attacker Value
Unknown
CVE-2024-11316
Disclosure Date: December 05, 2024 (last updated December 21, 2024)
Fileszie Check vulnerabilities allow a malicious user to bypass size limits or overload to the product.
Affected products:
ABB ASPECT - Enterprise v3.08.02;
NEXUS Series v3.08.02;
MATRIX Series v3.08.02
0
Attacker Value
Unknown
CVE-2024-36466
Disclosure Date: November 28, 2024 (last updated December 21, 2024)
A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.
0
Attacker Value
Unknown
CVE-2024-36464
Disclosure Date: November 27, 2024 (last updated December 21, 2024)
When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be expected to have access to these passwords.
0
Attacker Value
Unknown
CVE-2024-42333
Disclosure Date: November 27, 2024 (last updated December 21, 2024)
The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c
0
Attacker Value
Unknown
CVE-2024-42332
Disclosure Date: November 27, 2024 (last updated December 21, 2024)
The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host.
0
Attacker Value
Unknown
CVE-2024-42331
Disclosure Date: November 27, 2024 (last updated December 21, 2024)
In the src/libs/zbxembed/browser.c file, the es_browser_ctor method retrieves a heap pointer from the Duktape JavaScript engine. This heap pointer is subsequently utilized by the browser_push_error method in the src/libs/zbxembed/browser_error.c file. A use-after-free bug can occur at this stage if the wd->browser heap pointer is freed by garbage collection.
0
Attacker Value
Unknown
CVE-2024-42330
Disclosure Date: November 27, 2024 (last updated December 21, 2024)
The HttpRequest object allows to get the HTTP headers from the server's response after sending the request. The problem is that the returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScript. This allows to create internal strings that can be used to access hidden properties of objects.
0
Attacker Value
Unknown
CVE-2024-42329
Disclosure Date: November 27, 2024 (last updated December 21, 2024)
The webdriver for the Browser object expects an error object to be initialized when the webdriver_session_query function fails. But this function can fail for various reasons without an error description and then the wd->error will be NULL and trying to read from it will result in a crash.
0
Attacker Value
Unknown
CVE-2024-42328
Disclosure Date: November 27, 2024 (last updated December 21, 2024)
When the webdriver for the Browser object downloads data from a HTTP server, the data pointer is set to NULL and is allocated only in curl_write_cb when receiving data. If the server's response is an empty document, then wd->data in the code below will remain NULL and an attempt to read from it will result in a crash.
0