Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3984-1 | zabbix security update |
EUVD |
EUVD-2024-39879 | The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c |
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 08 Oct 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zabbix zabbix
|
|
| CPEs | cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Zabbix zabbix
|
Wed, 27 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 27 Nov 2024 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c | |
| Title | Heap buffer over-read | |
| Weaknesses | CWE-126 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2025-11-03T22:04:47.471Z
Reserved: 2024-07-30T08:27:36.132Z
Link: CVE-2024-42333
Updated: 2024-11-27T14:54:32.615Z
Status : Modified
Published: 2024-11-27T12:15:21.350
Modified: 2025-11-03T22:18:05.277
Link: CVE-2024-42333
No data.
OpenCVE Enrichment
Updated: 2025-07-13T11:21:48Z
Debian DLA
EUVD