Vulnerabilities (CVE)

Filtered by vendor Zabbix Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-29454 1 Zabbix 1 Frontend 2023-08-22 N/A 5.4 MEDIUM
Stored or persistent cross-site scripting (XSS) is a type of XSS where the attacker first sends the payload to the web application, then the application saves the payload (e.g., in a database or server-side text files), and finally, the application unintentionally executes the payload for every victim visiting its web pages.
CVE-2022-35229 1 Zabbix 1 Zabbix 2023-08-22 3.5 LOW 5.4 MEDIUM
An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.
CVE-2023-29457 1 Zabbix 1 Frontend 2023-08-22 N/A 6.1 MEDIUM
Reflected XSS attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script can be activated through Action form fields, which can be sent as request to a website with a vulnerability that enables execution of malicious scripts.
CVE-2023-29456 1 Zabbix 1 Frontend 2023-08-22 N/A 5.4 MEDIUM
URL validation scheme receives input from a user and then parses it to identify its various components. The validation scheme can ensure that all URL components comply with internet standards.
CVE-2023-29455 1 Zabbix 1 Frontend 2023-08-22 N/A 6.1 MEDIUM
Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script is activated through a link, which sends a request to a website with a vulnerability that enables execution of malicious scripts.
CVE-2023-30958 1 Zabbix 1 Frontend 2023-08-08 N/A 6.1 MEDIUM
A security defect was identified in Foundry Frontend that enabled users to potentially conduct DOM XSS attacks if Foundry's CSP were to be bypassed. This defect was resolved with the release of Foundry Frontend 6.225.0.
CVE-2022-35230 1 Zabbix 1 Zabbix 2022-07-14 3.5 LOW 5.4 MEDIUM
An authenticated user can create a link with reflected Javascript code inside it for the graphs page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.
CVE-2022-23133 2 Fedoraproject, Zabbix 2 Fedora, Zabbix 2022-02-10 3.5 LOW 5.4 MEDIUM
An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts.
CVE-2022-23134 3 Debian, Fedoraproject, Zabbix 3 Debian Linux, Fedora, Zabbix 2022-02-10 5.0 MEDIUM 5.3 MEDIUM
After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
CVE-2019-15132 2 Debian, Zabbix 2 Debian Linux, Zabbix 2021-07-21 5.0 MEDIUM 5.3 MEDIUM
Zabbix through 4.4.0alpha1 allows User Enumeration. With login requests, it is possible to enumerate application usernames based on the variability of server responses (e.g., the "Login name or password is incorrect" and "No permissions for system access" messages, or just blocking for a number of seconds). This affects both api_jsonrpc.php and index.php.
CVE-2020-15803 1 Zabbix 1 Zabbix 2021-04-21 4.3 MEDIUM 6.1 MEDIUM
Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget.
CVE-2016-10742 2 Debian, Zabbix 2 Debian Linux, Zabbix 2020-11-21 5.8 MEDIUM 6.1 MEDIUM
Zabbix before 2.2.21rc1, 3.x before 3.0.13rc1, 3.1.x and 3.2.x before 3.2.10rc1, and 3.3.x and 3.4.x before 3.4.4rc1 allows open redirect via the request parameter.