Количество 11
Количество 11

CVE-2024-36467
An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access.

CVE-2024-36467
An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access.
CVE-2024-36467
An authenticated user with API access (e.g.: user with default User ro ...
GHSA-xwvj-c6cj-6xgw
An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access.

BDU:2024-10777
Уязвимость интерфейса универсальной системы мониторинга Zabbix, позволяющая нарушителю повысить свои привилегии

ROS-20241216-06
Множественные уязвимости zabbix-server-pgsql

ROS-20241216-05
Множественные уязвимости zabbix-server-mysql

ROS-20241216-04
Множественные уязвимости zabbix-lts-server-mysql

ROS-20241216-03
Множественные уязвимости zabbix-lts-server-pgsql

ROS-20241216-02
Множественные уязвимости zabbix7-lts-server-pgsql

ROS-20241216-01
Множественные уязвимости zabbix7-lts-server-mysql
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-36467 An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access. | CVSS3: 7.5 | 0% Низкий | 7 месяцев назад |
![]() | CVE-2024-36467 An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access. | CVSS3: 7.5 | 0% Низкий | 7 месяцев назад |
CVE-2024-36467 An authenticated user with API access (e.g.: user with default User ro ... | CVSS3: 7.5 | 0% Низкий | 7 месяцев назад | |
GHSA-xwvj-c6cj-6xgw An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access. | CVSS3: 7.5 | 0% Низкий | 7 месяцев назад | |
![]() | BDU:2024-10777 Уязвимость интерфейса универсальной системы мониторинга Zabbix, позволяющая нарушителю повысить свои привилегии | CVSS3: 7.5 | 0% Низкий | около 1 года назад |
![]() | ROS-20241216-06 Множественные уязвимости zabbix-server-pgsql | CVSS3: 8.8 | 6 месяцев назад | |
![]() | ROS-20241216-05 Множественные уязвимости zabbix-server-mysql | CVSS3: 8.8 | 6 месяцев назад | |
![]() | ROS-20241216-04 Множественные уязвимости zabbix-lts-server-mysql | CVSS3: 8.8 | 6 месяцев назад | |
![]() | ROS-20241216-03 Множественные уязвимости zabbix-lts-server-pgsql | CVSS3: 8.8 | 6 месяцев назад | |
![]() | ROS-20241216-02 Множественные уязвимости zabbix7-lts-server-pgsql | CVSS3: 8.8 | 6 месяцев назад | |
![]() | ROS-20241216-01 Множественные уязвимости zabbix7-lts-server-mysql | CVSS3: 8.8 | 6 месяцев назад |
Уязвимостей на страницу