Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3909-1 zabbix security update
EUVD EUVD EUVD-2024-36105 Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 04 Nov 2025 07:30:00 +0900

Type Values Removed Values Added
References

Wed, 11 Dec 2024 01:45:00 +0900

Type Values Removed Values Added
First Time appeared Zabbix
Zabbix zabbix
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:7.0.0:*:*:*:*:*:*:*
Vendors & Products Zabbix
Zabbix zabbix

Sat, 10 Aug 2024 01:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 09 Aug 2024 23:00:00 +0900


Fri, 09 Aug 2024 18:45:00 +0900

Type Values Removed Values Added
Description Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine.
Title Direct access to memory pointers within the JS engine for modification
Weaknesses CWE-822
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2025-11-03T21:55:13.273Z

Reserved: 2024-05-28T11:21:24.946Z

Link: CVE-2024-36461

cve-icon Vulnrichment

Updated: 2025-11-03T21:55:13.273Z

cve-icon NVD

Status : Modified

Published: 2024-08-12T13:38:22.180

Modified: 2025-11-03T22:16:58.120

Link: CVE-2024-36461

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses