CVE-2024-37782 |
|
CVE-2024-36468 |
Description: The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session->securityEngineID to local_record.engineid without proper bounds checking.
CVSS: LOW (3.0) EPSS Score: 0.04%
November 28th, 2024 (5 months ago)
|
CVE-2024-36467 |
Description: An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access.
CVSS: HIGH (7.5) EPSS Score: 0.04%
November 28th, 2024 (5 months ago)
|
CVE-2024-36464 |
Description: When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be expected to have access to these passwords.
CVSS: LOW (2.7) EPSS Score: 0.04%
November 28th, 2024 (5 months ago)
|
CVE-2024-33439 |
|
CVE-2024-31976 |
|
CVE-2024-31484 |
Description: A vulnerability has been identified in CPC80 Central Processing/Communication (All versions < V16.41), CPCI85 Central Processing/Communication (All versions < V5.30), CPCX26 Central Processing/Communication (All versions < V06.02), ETA4 Ethernet Interface IEC60870-5-104 (All versions < V10.46), ETA5 Ethernet Int. 1x100TX IEC61850 Ed.2 (All versions < V03.27), PCCX26 Ax 1703 PE, Contr, Communication Element (All versions < V06.05). The affected devices contain an improper null termination vulnerability while parsing a specific HTTP header. This could allow an attacker to execute code in the context of the current process or lead to denial of service condition.
CVSS: HIGH (7.8) EPSS Score: 0.05%
November 28th, 2024 (5 months ago)
|
CVE-2024-30896 |
Description: InfluxDB through 2.7.10 allows allAccess administrators to retrieve all raw tokens via an "influx auth ls" command. NOTE: the supplier indicates that this is intentional but is a "poor design choice" that will be changed in a future release.
EPSS Score: 0.04%
November 28th, 2024 (5 months ago)
|
CVE-2024-29292 |
|
CVE-2024-29014 |
|