Логотип exploitDog
bind:CVE-2026-23921
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-23921

Количество 3

Количество 3

nvd логотип

CVE-2026-23921

9 дней назад

A low privilege Zabbix user with API access can exploit a blind SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL selects via the sortfield parameter. Although query results are not returned directly, an attacker can exfiltrate arbitrary database data through time-based techniques, potentially leading to session identifier disclosure and administrator account compromise.

EPSS: Низкий
debian логотип

CVE-2026-23921

9 дней назад

A low privilege Zabbix user with API access can exploit a blind SQL in ...

EPSS: Низкий
github логотип

GHSA-j24v-fg24-6mqq

9 дней назад

A low privilege Zabbix user with API access can exploit a blind SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL selects via the sortfield parameter. Although query results are not returned directly, an attacker can exfiltrate arbitrary database data through time-based techniques, potentially leading to session identifier disclosure and administrator account compromise.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-23921

A low privilege Zabbix user with API access can exploit a blind SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL selects via the sortfield parameter. Although query results are not returned directly, an attacker can exfiltrate arbitrary database data through time-based techniques, potentially leading to session identifier disclosure and administrator account compromise.

0%
Низкий
9 дней назад
debian логотип
CVE-2026-23921

A low privilege Zabbix user with API access can exploit a blind SQL in ...

0%
Низкий
9 дней назад
github логотип
GHSA-j24v-fg24-6mqq

A low privilege Zabbix user with API access can exploit a blind SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL selects via the sortfield parameter. Although query results are not returned directly, an attacker can exfiltrate arbitrary database data through time-based techniques, potentially leading to session identifier disclosure and administrator account compromise.

0%
Низкий
9 дней назад

Уязвимостей на страницу