Search CVE reports
11 – 20 of 122 results
The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change.
1 affected package
zabbix
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
A Zabbix adminitrator can inject arbitrary SQL during the autoremoval of hosts by inserting malicious SQL in the 'Visible name' field.
1 affected package
zabbix
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
Due to a bug in Zabbix API, the hostprototype.get method lists all host prototypes to users that do not have any user groups assigned to them.
1 affected package
zabbix
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.
1 affected package
zabbix
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a Windows system.
1 affected package
zabbix
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attacker can send specially crafted requests to the server, which will cause the server to allocate an excessive amount of memory and...
1 affected package
zabbix
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output...
1 affected package
zabbix
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
Zabbix API user.get returns all users that share common group with the calling user. This includes media and other information, such as login attempts, etc.
1 affected package
zabbix
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
Execution time for an unsuccessful login differs when using a non-existing username compared to using an existing one.
1 affected package
zabbix
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.
1 affected package
zabbix
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |