Show filters
455 Total Results
Displaying 41-50 of 455
Sort by:
Attacker Value
Unknown

CVE-2024-42327

Disclosure Date: November 27, 2024 (last updated December 21, 2024)
A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.
0
Attacker Value
Unknown

CVE-2024-42326

Disclosure Date: November 27, 2024 (last updated December 21, 2024)
There was discovered a use after free bug in browser.c in the es_browser_get_variant function
0
Attacker Value
Unknown

CVE-2024-36468

Disclosure Date: November 27, 2024 (last updated December 21, 2024)
The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session->securityEngineID to local_record.engineid without proper bounds checking.
0
Attacker Value
Unknown

CVE-2024-36467

Disclosure Date: November 27, 2024 (last updated December 21, 2024)
An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access.
0
Attacker Value
Unknown

CVE-2024-36463

Disclosure Date: November 26, 2024 (last updated January 05, 2025)
The implementation of atob in "Zabbix JS" allows to create a string with arbitrary content and use it to access internal properties of objects.
0
Attacker Value
Unknown

CVE-2024-22117

Disclosure Date: November 26, 2024 (last updated January 05, 2025)
When a URL is added to the map element, it is recorded in the database with sequential IDs. Upon adding a new URL, the system retrieves the last sysmapelementurlid value and increments it by one. However, an issue arises when a user manually changes the sysmapelementurlid value by adding sysmapelementurlid + 1. This action prevents others from adding URLs to the map element.
0
Attacker Value
Unknown

CVE-2024-11412

Disclosure Date: November 21, 2024 (last updated January 05, 2025)
The Shine PDF Embeder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'shinepdf' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Attacker Value
Unknown

CVE-2024-51988

Disclosure Date: November 06, 2024 (last updated November 07, 2024)
RabbitMQ is a feature rich, multi-protocol messaging and streaming broker. In affected versions queue deletion via the HTTP API was not verifying the `configure` permission of the user. Users who had all of the following: 1. Valid credentials, 2. Some permissions for the target virtual host & 3. HTTP API access. could delete queues it had no (deletion) permissions for. This issue has been addressed in version 3.12.11 of the open source rabbitMQ release and in versions 1.5.2, 3.13.0, and 4.0.0 of the tanzu release. Users are advised to upgrade. Users unable to upgrade may disable management plugin and use, for example, Prometheus and Grafana for monitoring.
0
Attacker Value
Unknown

CVE-2024-8036

Disclosure Date: October 25, 2024 (last updated October 26, 2024)
ABB is aware of privately reported vulnerabilities in the product versions referenced in this CVE. An attacker could exploit these vulnerabilities by sending a specially crafted firmware or configuration to the system node, causing the node to stop, become inaccessible, or allowing the attacker to take control of the node.
0
Attacker Value
Unknown

CVE-2024-6157

Disclosure Date: October 10, 2024 (last updated October 12, 2024)
An attacker who successfully exploited these vulnerabilities could cause the robot to stop. A vulnerability exists in the PROFINET stack included in the RobotWare versions listed below.  This vulnerability arises under specific condition when specially crafted message is processed by the system. Below are reported vulnerabilities in the Robot Ware versions. * IRC5- RobotWare 6 < 6.15.06 except 6.10.10, and 6.13.07
0