Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zabbix vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-29449
JavaScript preprocessing, webhooks and global scripts can cause uncontrolled CPU, memory, and disk I/O utilization. Preprocessing/webhook/global script configuration and testing are only available to Administrative roles (Admin and Superadmin). Administrative privileges should be...
Zabbix Zabbix 6.4.0
Zabbix Zabbix
7.5
CVSSv2
CVE-2010-1277
SQL injection vulnerability in the user.authenticate method in the API in Zabbix 1.8 prior to 1.8.2 allows remote malicious users to execute arbitrary SQL commands via the user parameter in JSON data to api_jsonrpc.php.
Zabbix Zabbix 1.8
Zabbix Zabbix 1.8.1
7.5
CVSSv2
CVE-2011-4674
SQL injection vulnerability in popup.php in Zabbix 1.8.3 and 1.8.4, and possibly other versions prior to 1.8.9, allows remote malicious users to execute arbitrary SQL commands via the only_hostid parameter.
Zabbix Zabbix 1.8.4
Zabbix Zabbix 1.8.3
1 EDB exploit
5
CVSSv2
CVE-2013-7484
Zabbix prior to 5.0 represents passwords in the users table with unsalted MD5.
Zabbix Zabbix 2.0.8
Zabbix Zabbix 4.4.0
10
CVSSv2
CVE-2022-22704
The zabbix-agent2 package prior to 5.4.9-r1 for Alpine Linux sometimes allows privilege escalation to root because the design incorrectly expected that systemd would (in effect) determine part of the configuration.
Zabbix Zabbix-agent2
Zabbix Zabbix-agent2 5.4.9
NA
CVE-2023-32726
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
Zabbix Zabbix-agent 7.0.0
Zabbix Zabbix-agent
NA
CVE-2023-32727
An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server.
Zabbix Zabbix Server
Zabbix Zabbix Server 7.0.0
NA
CVE-2023-32728
The Zabbix Agent 2 item key smart.disk.get does not sanitize its parameters before passing them to a shell command resulting possible vulnerability for remote code execution.
Zabbix Zabbix-agent2
Zabbix Zabbix-agent2 7.0.0
4.3
CVSSv2
CVE-2020-15803
Zabbix prior to 3.0.32rc1, 4.x prior to 4.0.22rc1, 4.1.x up to and including 4.4.x prior to 4.4.10rc1, and 5.x prior to 5.0.2rc1 allows stored XSS in the URL Widget.
Zabbix Zabbix 5.0.2
Zabbix Zabbix
Zabbix Zabbix 4.4.10
Zabbix Zabbix 4.0.22
Zabbix Zabbix 3.0.32
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 9.0
Opensuse Leap 15.1
Opensuse Leap 15.2
Opensuse Backports Sle-15
NA
CVE-2022-40626
An unauthenticated user can create a link with reflected Javascript code inside the backurl parameter and send it to other authenticated users in order to create a fake account with predefined login, password and role in Zabbix Frontend.
Zabbix Zabbix 6.2.0
Zabbix Zabbix
Fedoraproject Fedora 37
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »