0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Zabbix Server Multiple remote vulnerabilities
============================================= Zabbix Server Multiple remote vulnerabilities ============================================= Zabbix Server : Multiple remote vulnerabilities From: Nicob <nicob () nicob net> Date: Sun, 13 Dec 2009 16:28:35 +0100 From Wikipedia : "Zabbix is a network management system application [...] designed to monitor and track the status of various network services, servers, and other network hardware." [Zabbix Server : Remote command execution] Impacted software : Zabbix Server Zabbix reference : https://support.zabbix.com/browse/ZBX-1030 Patched version : 1.8 Faulty source code : function node_process_command() in zabbix_server/trapper/nodecommand.c Changelog entry : fixed security vulnerability in server allowing remote unauthenticated users to execute scripts [Zabbix Server : Remote SQL execution] Impacted software : Zabbix Server Zabbix reference : https://support.zabbix.com/browse/ZBX-1031 Patched version : 1.6.8 (patch for 1.6.7 was insufficient) Faulty source code : function send_history_last_id() in zabbix_server/trapper/nodehistory.c Changelog entry (1.6.7) : fixed security vulnerability in server, allowing remote unauthenticated users to execute arbitrary SQL queries Changelog entry (1.6.8) : added more security checks for communication between nodes [Zabbix Server : Remote DoS (NULL deref)] Impacted software : Zabbix Server Zabbix reference : https://support.zabbix.com/browse/ZBX-993 Patched version : 1.6.6 Faulty source code : function process_trap() in zabbix_server/trapper/trapper.c Changelog entry : fixed possible vulnerability of trapper [Zabbix Server : Remote DoS (NULL deref)] Impacted software : Zabbix Server Zabbix reference : https://support.zabbix.com/browse/ZBX-1355 Patched version : 1.6.8 Faulty source code : function zbx_get_next_field() in libs/zbxcommon/str.c Changelog entry : fixed possible server crash when receiving invalid data # 0day.today [2024-11-16] #