Search CVE reports


Toggle filters

11 – 20 of 122 results


CVE-2025-27231

Medium priority
Needs evaluation

The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change.

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2025-27240

Medium priority
Needs evaluation

A Zabbix adminitrator can inject arbitrary SQL during the autoremoval of hosts by inserting malicious SQL in the 'Visible name' field.

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2025-27238

Medium priority
Needs evaluation

Due to a bug in Zabbix API, the hostprototype.get method lists all host prototypes to users that do not have any user groups assigned to them.

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2025-27234

Medium priority
Needs evaluation

Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2025-27233

Medium priority
Needs evaluation

Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a Windows system.

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-45700

Medium priority
Needs evaluation

Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attacker can send specially crafted requests to the server, which will cause the server to allocate an excessive amount of memory and...

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-45699

Medium priority
Needs evaluation

The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output...

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-42325

Medium priority
Needs evaluation

Zabbix API user.get returns all users that share common group with the calling user. This includes media and other information, such as login attempts, etc.

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-36469

Medium priority
Needs evaluation

Execution time for an unsuccessful login differs when using a non-existing username compared to using an existing one.

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-36465

Medium priority
Needs evaluation

A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages