Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zabbix zabbix vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2006-6693
Multiple buffer overflows in zabbix prior to 20061006 allow malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via long strings to the (1) zabbix_log and (2) zabbix_syslog functions.
Zabbix Zabbix 1.1.2
655
VMScore
CVE-2013-3628
Zabbix 2.0.9 has an Arbitrary Command Execution Vulnerability
Zabbix Zabbix 2.0.9
1 EDB exploit
1 Github repository
606
VMScore
CVE-2021-27927
In Zabbix from 4.0.x prior to 4.0.28rc1, 5.0.0alpha1 prior to 5.0.10rc1, 5.2.x prior to 5.2.6rc1, and 5.4.0alpha1 prior to 5.4.0beta2, the CControllerAuthenticationUpdate controller lacks a CSRF protection mechanism. The code inside this controller calls diableSIDValidation insid...
Zabbix Zabbix
606
VMScore
CVE-2017-2824
An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigge...
Zabbix Zabbix 2.4.1
Zabbix Zabbix 2.4.9
Zabbix Zabbix 2.4.2
Zabbix Zabbix 2.4.0
Zabbix Zabbix 2.4.4
Zabbix Zabbix 2.4.3
Zabbix Zabbix 2.4.6
Zabbix Zabbix 2.4.5
Zabbix Zabbix 2.4.8
Zabbix Zabbix 2.4.7
2 Github repositories
605
VMScore
CVE-2017-2825
In the trapper functionality of Zabbix Server 2.4.x, specifically crafted trapper packets can pass database logic checks, resulting in database writes. An attacker can set up a Man-in-the-Middle server to alter trapper requests made between an active Zabbix proxy and Server to tr...
Zabbix Zabbix
Debian Debian Linux 8.0
Debian Debian Linux 9.0
578
VMScore
CVE-2021-46088
Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the "Zabbix Admin" role is able to run custom shell script on the application server in the context of the application user.
Zabbix Zabbix
1 Github repository
570
VMScore
CVE-2019-17382
An issue exists in zabbix.php?action=dashboard.view&dashboardid=1 in Zabbix up to and including 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any Username/Password (i.e., anonymously). All...
Zabbix Zabbix
1 Github repository
516
VMScore
CVE-2016-10742
Zabbix prior to 2.2.21rc1, 3.x prior to 3.0.13rc1, 3.1.x and 3.2.x prior to 3.2.10rc1, and 3.3.x and 3.4.x prior to 3.4.4rc1 allows open redirect via the request parameter.
Zabbix Zabbix
Debian Debian Linux 8.0
505
VMScore
CVE-2009-4501
The zbx_get_next_field function in libs/zbxcommon/str.c in Zabbix Server prior to 1.6.8 allows remote malicious users to cause a denial of service (crash) via a request that lacks expected separators, which triggers a NULL pointer dereference, as demonstrated using the Command ke...
Zabbix Zabbix 1.1.3
Zabbix Zabbix 1.4.6
Zabbix Zabbix 1.4.4
Zabbix Zabbix 1.6.6
Zabbix Zabbix 1.4.3
Zabbix Zabbix 1.4.2
Zabbix Zabbix 1.1.5
Zabbix Zabbix
Zabbix Zabbix 1.1.4
Zabbix Zabbix 1.1.2
1 EDB exploit
490
VMScore
CVE-2014-1685
The Frontend in Zabbix prior to 1.8.20rc2, 2.0.x prior to 2.0.11rc2, and 2.2.x prior to 2.2.2rc1 allows remote "Zabbix Admin" users to modify the media of arbitrary users via unspecified vectors.
Zabbix Zabbix 2.0.2
Zabbix Zabbix 2.0.3
Zabbix Zabbix 2.2.1
Zabbix Zabbix 2.2.0
Zabbix Zabbix 2.0.4
Zabbix Zabbix 2.0.5
Zabbix Zabbix 2.0.6
Zabbix Zabbix 1.8
Zabbix Zabbix 2.0.7
Zabbix Zabbix 2.0.8
Zabbix Zabbix 2.0.0
Zabbix Zabbix 2.0.1
Zabbix Zabbix
Zabbix Zabbix 1.8.2
Zabbix Zabbix 1.8.3
Zabbix Zabbix 2.0.9
Zabbix Zabbix 2.0.10
Zabbix Zabbix 1.8.1
Zabbix Zabbix 1.8.16
Fedoraproject Fedora 19
Zabbix Zabbix 1.8.15
Zabbix Zabbix 1.8.18
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »