Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine.
History

Fri, 09 Aug 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 09 Aug 2024 14:00:00 +0000


Fri, 09 Aug 2024 09:45:00 +0000

Type Values Removed Values Added
Description Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine.
Title Direct access to memory pointers within the JS engine for modification
Weaknesses CWE-822
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published: 2024-08-09T09:33:39.885Z

Updated: 2024-08-09T15:22:00.513Z

Reserved: 2024-05-28T11:21:24.946Z

Link: CVE-2024-36461

cve-icon Vulnrichment

Updated: 2024-08-09T15:20:05.591Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-12T13:38:22.180

Modified: 2024-08-12T13:41:36.517

Link: CVE-2024-36461

cve-icon Redhat

No data.