Search CVE reports
61 – 70 of 100 results
CVE-2020-15803
Medium priorityZabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget.
1 affected package
zabbix
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zabbix | Not in release | Not affected | Fixed | Fixed | Fixed |
CVE-2013-3738
Unknown priorityA File Inclusion vulnerability exists in Zabbix 2.0.6 due to inadequate sanitization of request strings in CGI scripts, which could let a remote malicious user execute arbitrary code.
1 affected package
zabbix
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zabbix | — | — | — | Not affected | Not affected |
CVE-2013-5743
Medium priorityMultiple SQL injection vulnerabilities in Zabbix 1.8.x before 1.8.18rc1, 2.0.x before 2.0.9rc1, and 2.1.x before 2.1.7.
1 affected package
zabbix
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zabbix | — | — | — | — | Not affected |
CVE-2013-7484
Low priorityZabbix before 5.0 represents passwords in the users table with unsalted MD5.
1 affected package
zabbix
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zabbix | Not in release | Not affected | Vulnerable | Vulnerable | Vulnerable |
CVE-2019-17382
Negligible priorityAn issue was discovered in zabbix.php?action=dashboard.view&dashboardid=1 in Zabbix through 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any...
1 affected package
zabbix
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zabbix | Not in release | Not affected | Not affected | Not affected | Not affected |
CVE-2019-15132
Low prioritySome fixes available 4 of 7
Zabbix through 4.4.0alpha1 allows User Enumeration. With login requests, it is possible to enumerate application usernames based on the variability of server responses (e.g., the "Login name or password is incorrect" and...
1 affected package
zabbix
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zabbix | Not in release | Not affected | Fixed | Fixed | Fixed |
CVE-2016-10742
Medium priorityZabbix before 2.2.21rc1, 3.x before 3.0.13rc1, 3.1.x and 3.2.x before 3.2.10rc1, and 3.3.x and 3.4.x before 3.4.4rc1 allows open redirect via the request parameter.
1 affected package
zabbix
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zabbix | — | Not affected | Not affected | Fixed | Not affected |
CVE-2017-2825
High prioritySome fixes available 2 of 4
In the trapper functionality of Zabbix Server 2.4.x, specifically crafted trapper packets can pass database logic checks, resulting in database writes. An attacker can set up a Man-in-the-Middle server to alter trapper requests...
1 affected package
zabbix
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zabbix | — | Not affected | Not affected | Not affected | Fixed |
CVE-2017-2826
Low priorityAn information disclosure vulnerability exists in the iConfig proxy request of Zabbix server 2.4.X. A specially crafted iConfig proxy request can cause the Zabbix server to send the configuration information of any Zabbix proxy,...
1 affected package
zabbix
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zabbix | Not in release | Not affected | Not affected | Not affected | Vulnerable |
CVE-2014-3005
Medium prioritySome fixes available 1 of 4
XML external entity (XXE) vulnerability in Zabbix 1.8.x before 1.8.21rc1, 2.0.x before 2.0.13rc1, 2.2.x before 2.2.5rc1, and 2.3.x before 2.3.2 allows remote attackers to read arbitrary files or potentially execute arbitrary code...
1 affected package
zabbix
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zabbix | — | Not affected | Not affected | Not affected | Not affected |