Search CVE reports
1 – 10 of 122 results
(Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.co ...)
1 affected package
zabbix
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
(A low privilege Zabbix user with API access can exploit a blind SQL in ...)
1 affected package
zabbix
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
(Host and event action script input is validated with a regex (set by t ...)
1 affected package
zabbix
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
(For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape ...)
1 affected package
zabbix
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
An authenticated Zabbix user (User role) with template/host write permissions is able to create objects via the configuration.import API. This can lead to confidentiality loss by creating unauthorized hosts. Note that the User...
1 affected package
zabbix
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.
1 affected package
zabbix
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files from the webserver leading to potential confidentiality loss.
1 affected package
zabbix
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
A regular Zabbix user with no permission to the Monitoring -> Problems view is still able to call the problem.view.refresh action and therefore still retrieve a list of active problems.
1 affected package
zabbix
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writable by low-privileged users, allowing malicious modification and potential local privilege escalation by injecting a DLL.
1 affected package
zabbix
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| zabbix | Not in release | Not affected | Not affected | Not affected |
A regular Zabbix user can search other users in their user group via Zabbix API by select fields the user does not have access to view. This allows data-mining some field values the user does not have access to.
1 affected package
zabbix
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |