Vulnerabilities (CVE)

Filtered by vendor Zabbix Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-32726 1 Zabbix 1 Zabbix-agent 2023-12-22 N/A 8.1 HIGH
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
CVE-2023-32725 1 Zabbix 2 Frontend, Zabbix Server 2023-12-22 N/A 8.8 HIGH
The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user.
CVE-2023-32727 1 Zabbix 1 Zabbix Server 2023-12-22 N/A 7.2 HIGH
An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server.
CVE-2023-29450 1 Zabbix 1 Zabbix 2023-08-22 N/A 7.5 HIGH
JavaScript pre-processing can be used by the attacker to gain access to the file system (read-only access on behalf of user "zabbix") on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data.
CVE-2023-29451 1 Zabbix 1 Zabbix 2023-08-22 N/A 7.5 HIGH
Specially crafted string can cause a buffer overrun in the JSON parser library leading to a crash of the Zabbix Server or a Zabbix Proxy.
CVE-2013-7484 1 Zabbix 1 Zabbix 2023-08-22 5.0 MEDIUM 7.5 HIGH
Zabbix before 5.0 represents passwords in the users table with unsalted MD5.
CVE-2021-27927 1 Zabbix 1 Zabbix 2022-04-26 6.8 MEDIUM 8.8 HIGH
In Zabbix from 4.0.x before 4.0.28rc1, 5.0.0alpha1 before 5.0.10rc1, 5.2.x before 5.2.6rc1, and 5.4.0alpha1 before 5.4.0beta2, the CControllerAuthenticationUpdate controller lacks a CSRF protection mechanism. The code inside this controller calls diableSIDValidation inside the init() method. An attacker doesn't have to know Zabbix user login credentials, but has to know the correct Zabbix URL and contact information of an existing user with sufficient privileges.
CVE-2022-23132 2 Fedoraproject, Zabbix 2 Fedora, Zabbix 2022-02-10 7.5 HIGH 7.3 HIGH
During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level
CVE-2021-46088 1 Zabbix 1 Zabbix 2022-02-02 6.5 MEDIUM 7.2 HIGH
Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the "Zabbix Admin" role is able to run custom shell script on the application server in the context of the application user.
CVE-2013-3628 1 Zabbix 1 Zabbix 2020-02-10 6.5 MEDIUM 8.8 HIGH
Zabbix 2.0.9 has an Arbitrary Command Execution Vulnerability
CVE-2017-2825 2 Debian, Zabbix 2 Debian Linux, Zabbix 2019-10-03 6.8 MEDIUM 7.0 HIGH
In the trapper functionality of Zabbix Server 2.4.x, specifically crafted trapper packets can pass database logic checks, resulting in database writes. An attacker can set up a Man-in-the-Middle server to alter trapper requests made between an active Zabbix proxy and Server to trigger this vulnerability.
CVE-2017-2824 1 Zabbix 1 Zabbix 2019-10-03 6.8 MEDIUM 8.1 HIGH
An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.
CVE-2016-4338 1 Zabbix 1 Zabbix 2018-10-09 6.8 MEDIUM 8.1 HIGH
The mysql user parameter configuration script (userparameter_mysql.conf) in the agent in Zabbix before 2.0.18, 2.2.x before 2.2.13, and 3.0.x before 3.0.3, when used with a shell other than bash, allows context-dependent attackers to execute arbitrary code or SQL commands via the mysql.size parameter.