Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zabbix zabbix vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2017-2825
In the trapper functionality of Zabbix Server 2.4.x, specifically crafted trapper packets can pass database logic checks, resulting in database writes. An attacker can set up a Man-in-the-Middle server to alter trapper requests made between an active Zabbix proxy and Server to tr...
Zabbix Zabbix
Debian Debian Linux 8.0
Debian Debian Linux 9.0
6.8
CVSSv2
CVE-2017-2824
An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigge...
Zabbix Zabbix 2.4.2
Zabbix Zabbix 2.4.0
Zabbix Zabbix 2.4.9
Zabbix Zabbix 2.4.4
Zabbix Zabbix 2.4.6
Zabbix Zabbix 2.4.3
Zabbix Zabbix 2.4.5
Zabbix Zabbix 2.4.1
Zabbix Zabbix 2.4.8
Zabbix Zabbix 2.4.7
2 Github repositories
6.8
CVSSv2
CVE-2016-4338
The mysql user parameter configuration script (userparameter_mysql.conf) in the agent in Zabbix prior to 2.0.18, 2.2.x prior to 2.2.13, and 3.0.x prior to 3.0.3, when used with a shell other than bash, allows context-dependent malicious users to execute arbitrary code or SQL comm...
Zabbix Zabbix 2.0.0
Zabbix Zabbix 2.2.2
Zabbix Zabbix 2.2.0
Zabbix Zabbix 2.0.5
Zabbix Zabbix 2.0.14
Zabbix Zabbix 2.0.9
Zabbix Zabbix 2.2.12
Zabbix Zabbix 3.0.2
Zabbix Zabbix 2.2.1
Zabbix Zabbix 2.0.1
Zabbix Zabbix 2.2.6
Zabbix Zabbix 2.0.11
Zabbix Zabbix 2.0.6
Zabbix Zabbix 2.2.11
Zabbix Zabbix 2.0.4
Zabbix Zabbix 2.0.15
Zabbix Zabbix 2.2.7
Zabbix Zabbix 2.0.12
Zabbix Zabbix 3.0.0
Zabbix Zabbix 2.2.4
Zabbix Zabbix 2.0.3
Zabbix Zabbix 2.2.9
1 EDB exploit
6.8
CVSSv2
CVE-2009-4498
The node_process_command function in Zabbix Server prior to 1.8 allows remote malicious users to execute arbitrary commands via a crafted request.
Zabbix Zabbix 1.1.2
Zabbix Zabbix 1.1.4
Zabbix Zabbix 1.4.3
Zabbix Zabbix 1.6.8
Zabbix Zabbix 1.7.1
Zabbix Zabbix
Zabbix Zabbix 1.7.2
Zabbix Zabbix 1.7
Zabbix Zabbix 1.6.7
Zabbix Zabbix 1.7.3
Zabbix Zabbix 1.1.3
Zabbix Zabbix 1.6.6
Zabbix Zabbix 1.4.2
Zabbix Zabbix 1.1.5
2 EDB exploits
6.5
CVSSv2
CVE-2021-46088
Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the "Zabbix Admin" role is able to run custom shell script on the application server in the context of the application user.
Zabbix Zabbix
1 Github repository
6.5
CVSSv2
CVE-2013-3628
Zabbix 2.0.9 has an Arbitrary Command Execution Vulnerability
Zabbix Zabbix 2.0.9
1 EDB exploit
1 Github repository
6.4
CVSSv2
CVE-2019-17382
An issue exists in zabbix.php?action=dashboard.view&dashboardid=1 in Zabbix up to and including 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any Username/Password (i.e., anonymously). All...
Zabbix Zabbix
1 Github repository
5.8
CVSSv2
CVE-2016-10742
Zabbix prior to 2.2.21rc1, 3.x prior to 3.0.13rc1, 3.1.x and 3.2.x prior to 3.2.10rc1, and 3.3.x and 3.4.x prior to 3.4.4rc1 allows open redirect via the request parameter.
Zabbix Zabbix
Debian Debian Linux 8.0
5.5
CVSSv2
CVE-2014-1685
The Frontend in Zabbix prior to 1.8.20rc2, 2.0.x prior to 2.0.11rc2, and 2.2.x prior to 2.2.2rc1 allows remote "Zabbix Admin" users to modify the media of arbitrary users via unspecified vectors.
Zabbix Zabbix 2.0.9
Zabbix Zabbix 2.0.1
Zabbix Zabbix 2.0.0
Zabbix Zabbix 2.2.0
Zabbix Zabbix 2.0.4
Zabbix Zabbix 2.0.5
Zabbix Zabbix 2.0.6
Zabbix Zabbix 2.0.3
Zabbix Zabbix 1.8.16
Zabbix Zabbix 2.2.1
Zabbix Zabbix 1.8.3
Zabbix Zabbix 2.0.10
Zabbix Zabbix 1.8.18
Zabbix Zabbix 1.8
Zabbix Zabbix 2.0.2
Zabbix Zabbix 1.8.15
Zabbix Zabbix 1.8.2
Zabbix Zabbix 2.0.8
Fedoraproject Fedora 20
Zabbix Zabbix 1.8.1
Zabbix Zabbix 2.0.7
Fedoraproject Fedora 19
5.1
CVSSv2
CVE-2022-23131
In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and g...
Zabbix Zabbix
Zabbix Zabbix 6.0.0
23 Github repositories
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »