Vigilance.fr - Zabbix: use after free via browser_push_error(), analyzed on 09/12/2024
An attacker can force the reuse of a freed memory area of Zabbix, via browser_push_error(), in order to trigger a denial of service, and possibly to run code. - Security Vulnerability

An attacker can force the reuse of a freed memory area of Zabbix, via browser_push_error(), in order to trigger a denial of service, and possibly to run code.