Zabbix

Zabbix

101 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Veröffentlicht 12.09.2025 10:31:58
  • Zuletzt bearbeitet 15.09.2025 15:21:42

Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.

Medienbericht
  • EPSS 0.03%
  • Veröffentlicht 02.04.2025 07:15:41
  • Zuletzt bearbeitet 03.11.2025 20:16:28

Zabbix API user.get returns all users that share common group with the calling user. This includes media and other information, such as login attempts, etc.

Medienbericht
  • EPSS 0.03%
  • Veröffentlicht 02.04.2025 07:15:41
  • Zuletzt bearbeitet 03.11.2025 20:16:30

The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a ...

Medienbericht
  • EPSS 0.03%
  • Veröffentlicht 02.04.2025 07:15:41
  • Zuletzt bearbeitet 03.11.2025 20:16:31

Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attacker can send specially crafted requests to the server, which will cause the server to allocate an excessive amount of memory and perform CPU-intensive...

Medienbericht
  • EPSS 0.03%
  • Veröffentlicht 02.04.2025 07:15:40
  • Zuletzt bearbeitet 03.11.2025 20:16:14

Execution time for an unsuccessful login differs when using a non-existing username compared to using an existing one.

Medienbericht
  • EPSS 0.1%
  • Veröffentlicht 02.04.2025 06:15:34
  • Zuletzt bearbeitet 08.10.2025 15:31:44

A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.

  • EPSS 0.21%
  • Veröffentlicht 28.11.2024 08:15:05
  • Zuletzt bearbeitet 08.10.2025 15:31:30

A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.

  • EPSS 0.12%
  • Veröffentlicht 27.11.2024 14:15:17
  • Zuletzt bearbeitet 03.11.2025 22:16:58

When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be exp...

  • EPSS 0.3%
  • Veröffentlicht 27.11.2024 12:15:21
  • Zuletzt bearbeitet 03.11.2025 22:18:04

The HttpRequest object allows to get the HTTP headers from the server's response after sending the request. The problem is that the returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScrip...

  • EPSS 0.06%
  • Veröffentlicht 27.11.2024 12:15:21
  • Zuletzt bearbeitet 03.11.2025 22:18:04

In the src/libs/zbxembed/browser.c file, the es_browser_ctor method retrieves a heap pointer from the Duktape JavaScript engine. This heap pointer is subsequently utilized by the browser_push_error method in the src/libs/zbxembed/browser_error.c file...