Zabbix

Zabbix

98 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Media report
  • EPSS 0.04%
  • Published 02.04.2025 07:15:41
  • Last modified 02.04.2025 14:58:07

Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attacker can send specially crafted requests to the server, which will cause the server to allocate an excessive amount of memory and perform CPU-intensive...

Media report
  • EPSS 0.03%
  • Published 02.04.2025 07:15:40
  • Last modified 02.04.2025 14:58:07

Execution time for an unsuccessful login differs when using a non-existing username compared to using an existing one.

Media report
  • EPSS 0.06%
  • Published 02.04.2025 06:15:34
  • Last modified 02.04.2025 14:58:07

A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.

  • EPSS 0.18%
  • Published 28.11.2024 08:15:05
  • Last modified 28.11.2024 08:15:05

A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.

  • EPSS 0.14%
  • Published 27.11.2024 14:15:17
  • Last modified 27.11.2024 14:15:17

When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be exp...

  • EPSS 0.17%
  • Published 27.11.2024 12:15:21
  • Last modified 27.11.2024 12:15:21

The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c

  • EPSS 0.17%
  • Published 27.11.2024 12:15:21
  • Last modified 27.11.2024 12:15:21

The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacke...

  • EPSS 0.07%
  • Published 27.11.2024 12:15:21
  • Last modified 27.11.2024 12:15:21

In the src/libs/zbxembed/browser.c file, the es_browser_ctor method retrieves a heap pointer from the Duktape JavaScript engine. This heap pointer is subsequently utilized by the browser_push_error method in the src/libs/zbxembed/browser_error.c file...

  • EPSS 0.25%
  • Published 27.11.2024 12:15:21
  • Last modified 27.11.2024 12:15:21

The HttpRequest object allows to get the HTTP headers from the server's response after sending the request. The problem is that the returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScrip...

  • EPSS 0.1%
  • Published 27.11.2024 12:15:20
  • Last modified 27.11.2024 12:15:20

The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session->securityEngineID to local_record.engineid without proper bound...