Zabbix

Zabbix

98 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Medienbericht
  • EPSS 0.04%
  • Veröffentlicht 02.04.2025 07:15:41
  • Zuletzt bearbeitet 02.04.2025 14:58:07

Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attacker can send specially crafted requests to the server, which will cause the server to allocate an excessive amount of memory and perform CPU-intensive...

Medienbericht
  • EPSS 0.03%
  • Veröffentlicht 02.04.2025 07:15:40
  • Zuletzt bearbeitet 02.04.2025 14:58:07

Execution time for an unsuccessful login differs when using a non-existing username compared to using an existing one.

Medienbericht
  • EPSS 0.06%
  • Veröffentlicht 02.04.2025 06:15:34
  • Zuletzt bearbeitet 02.04.2025 14:58:07

A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.

  • EPSS 0.18%
  • Veröffentlicht 28.11.2024 08:15:05
  • Zuletzt bearbeitet 28.11.2024 08:15:05

A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.

  • EPSS 0.14%
  • Veröffentlicht 27.11.2024 14:15:17
  • Zuletzt bearbeitet 27.11.2024 14:15:17

When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be exp...

  • EPSS 0.17%
  • Veröffentlicht 27.11.2024 12:15:21
  • Zuletzt bearbeitet 27.11.2024 12:15:21

The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c

  • EPSS 0.17%
  • Veröffentlicht 27.11.2024 12:15:21
  • Zuletzt bearbeitet 27.11.2024 12:15:21

The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacke...

  • EPSS 0.07%
  • Veröffentlicht 27.11.2024 12:15:21
  • Zuletzt bearbeitet 27.11.2024 12:15:21

In the src/libs/zbxembed/browser.c file, the es_browser_ctor method retrieves a heap pointer from the Duktape JavaScript engine. This heap pointer is subsequently utilized by the browser_push_error method in the src/libs/zbxembed/browser_error.c file...

  • EPSS 0.25%
  • Veröffentlicht 27.11.2024 12:15:21
  • Zuletzt bearbeitet 27.11.2024 12:15:21

The HttpRequest object allows to get the HTTP headers from the server's response after sending the request. The problem is that the returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScrip...

  • EPSS 0.1%
  • Veröffentlicht 27.11.2024 12:15:20
  • Zuletzt bearbeitet 27.11.2024 12:15:20

The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session->securityEngineID to local_record.engineid without proper bound...