Description

SQL injection vulnerability in Zabbix before 2.2.14 and 3.0 before 3.0.4 allows remote attackers to execute arbitrary SQL commands via the toggle_ids array parameter in latest.php.

INFO

Published Date :

Feb. 17, 2017, 2:59 a.m.

Last Modified :

Nov. 4, 2017, 1:29 a.m.

Remotely Exploitable :

Yes !

Impact Score :

5.9

Exploitability Score :

3.9
Public PoC/Exploit Available at Github

CVE-2016-10134 has a 17 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2016-10134 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Zabbix zabbix
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2016-10134.

URL Resource
http://www.debian.org/security/2017/dsa-3802
http://www.openwall.com/lists/oss-security/2017/01/12/4 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/01/13/4 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/95423 Third Party Advisory VDB Entry
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936 Third Party Advisory
https://code610.blogspot.com/2017/10/zbx-11023-quick-autopsy.html
https://support.zabbix.com/browse/ZBX-11023 Exploit Patch Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Updated: 4 days, 18 hours ago
0 stars 2 fork 2 watcher
Born at : Nov. 17, 2024, 11:53 a.m. This repo has been linked 414 different CVEs too.

Small & Fast Vulnerability Scanner Engine based on XRAY YAML Rule | 基于 XRAY YAML 规则的超轻量快速漏洞扫描引擎 | 可执行文件体积仅 2 MB

poc security vulnerability vulnerability-detection vulnerability-scanner web-security web-vulnerability-scanner

Batchfile Go ANTLR

Updated: 2 months, 1 week ago
50 stars 9 fork 9 watcher
Born at : Aug. 26, 2024, 11:11 a.m. This repo has been linked 23 different CVEs too.

None

Updated: 9 months, 3 weeks ago
0 stars 0 fork 0 watcher
Born at : Jan. 26, 2024, 10:07 a.m. This repo has been linked 161 different CVEs too.

在公网收集的gobypoc+部分自己加的poc

Updated: 2 months, 2 weeks ago
96 stars 5 fork 5 watcher
Born at : July 28, 2023, 4:28 p.m. This repo has been linked 296 different CVEs too.

vulcat可用于扫描Web端常见的CVE、CNVD等编号的漏洞,发现漏洞时会返回Payload信息。部分漏洞还支持命令行交互模式,可以持续利用漏洞

cnvd cve poc scanner security vulnerability cve-2021-42013 cve-2022-26134 cve-2020-9483 cve-2021-35042 cve-2018-7602 cve-2021-22205 cve-2021-43798 cve-2022-1388 cve-2020-10204 cnvd-2021-28277 cve-2021-3223 cve-2021-21234 cve-2019-15642 exp

Python HTML JavaScript TypeScript

Updated: 2 months, 2 weeks ago
121 stars 17 fork 17 watcher
Born at : April 10, 2022, 1:14 p.m. This repo has been linked 82 different CVEs too.

POC集合,框架nday漏洞利用

Updated: 2 months, 2 weeks ago
373 stars 49 fork 49 watcher
Born at : April 4, 2022, 5:54 a.m. This repo has been linked 105 different CVEs too.

一个Vulhub漏洞复现知识库

vulnerability exploit

Updated: 2 months, 2 weeks ago
448 stars 87 fork 87 watcher
Born at : March 3, 2022, 8:38 a.m. This repo has been linked 171 different CVEs too.

一个漏洞POC知识库 目前数量 1000+

poc

Updated: 2 months, 2 weeks ago
3417 stars 682 fork 682 watcher
Born at : Feb. 20, 2022, 6:43 a.m. This repo has been linked 405 different CVEs too.

安全类各家文库大乱斗

HTML CSS JavaScript Go Python Shell C

Updated: 2 months, 2 weeks ago
856 stars 214 fork 214 watcher
Born at : Feb. 15, 2022, 3:14 a.m. This repo has been linked 568 different CVEs too.

database of pocassist(漏洞库)

Updated: 1 year, 3 months ago
14 stars 21 fork 21 watcher
Born at : June 16, 2021, 11:36 a.m. This repo has been linked 61 different CVEs too.

database of pocassist(漏洞库)

pocassist vulnerability-scanners vulnerability-detection

Updated: 6 months, 1 week ago
81 stars 21 fork 21 watcher
Born at : June 16, 2021, 9:56 a.m. This repo has been linked 67 different CVEs too.

search info and write myself poc and exp

Python

Updated: 5 months, 2 weeks ago
3 stars 0 fork 0 watcher
Born at : June 9, 2021, 8:27 a.m. This repo has been linked 17 different CVEs too.

漏洞批量验证框架

poc vulnerability-scanners vulnerability verify-framework exploit cve scanner

Python

Updated: 2 months, 2 weeks ago
796 stars 159 fork 159 watcher
Born at : June 2, 2021, 6:09 a.m. This repo has been linked 59 different CVEs too.

essential templates for kenzer [DEPRECATED]

kenzer vulnerabilities kenzer-templates arpsyndicate

Python Shell Ruby

Updated: 3 months, 1 week ago
106 stars 32 fork 32 watcher
Born at : Sept. 18, 2020, 9:03 p.m. This repo has been linked 1653 different CVEs too.

Sr. Penetration Tester. Creator of Sn1per. Top 20 worldwide on @BugCrowd in 2016. OSCE/OSCP/CISSP/Security+

Updated: 5 months, 2 weeks ago
26 stars 4 fork 4 watcher
Born at : July 30, 2020, 10:09 p.m. This repo has been linked 8 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2016-10134 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2016-10134 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Nov. 04, 2017

    Action Type Old Value New Value
    Added Reference http://www.debian.org/security/2017/dsa-3802 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 31, 2017

    Action Type Old Value New Value
    Added Reference https://code610.blogspot.com/2017/10/zbx-11023-quick-autopsy.html [No Types Assigned]
  • Initial Analysis by [email protected]

    Feb. 22, 2017

    Action Type Old Value New Value
    Added CVSS V2 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Added CVSS V3 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type http://www.openwall.com/lists/oss-security/2017/01/12/4 No Types Assigned http://www.openwall.com/lists/oss-security/2017/01/12/4 Third Party Advisory, Mailing List
    Changed Reference Type https://support.zabbix.com/browse/ZBX-11023 No Types Assigned https://support.zabbix.com/browse/ZBX-11023 Vendor Advisory, Exploit, Patch
    Changed Reference Type http://www.openwall.com/lists/oss-security/2017/01/13/4 No Types Assigned http://www.openwall.com/lists/oss-security/2017/01/13/4 Third Party Advisory, Mailing List
    Changed Reference Type https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936 No Types Assigned https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936 Third Party Advisory
    Changed Reference Type http://www.securityfocus.com/bid/95423 No Types Assigned http://www.securityfocus.com/bid/95423 Third Party Advisory, VDB Entry
    Added CWE CWE-89
    Added CPE Configuration OR *cpe:2.3:a:zabbix:zabbix:2.2.13:*:*:*:*:*:*:* (and previous) *cpe:2.3:a:zabbix:zabbix:3.0.0:*:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:3.0.1:*:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:3.0.2:*:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:3.0.3:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2016-10134 is associated with the following CWEs:

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

4.48 }} -0.89%

score

0.92504

percentile

CVSS30 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability