CVE-2024-42325
- EPSS 0.05%
- Veröffentlicht 02.04.2025 07:15:41
- Zuletzt bearbeitet 03.11.2025 20:16:28
Zabbix API user.get returns all users that share common group with the calling user. This includes media and other information, such as login attempts, etc.
CVE-2024-45699
- EPSS 0.14%
- Veröffentlicht 02.04.2025 07:15:41
- Zuletzt bearbeitet 03.11.2025 20:16:30
The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a ...
CVE-2024-45700
- EPSS 0.15%
- Veröffentlicht 02.04.2025 07:15:41
- Zuletzt bearbeitet 03.11.2025 20:16:31
Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attacker can send specially crafted requests to the server, which will cause the server to allocate an excessive amount of memory and perform CPU-intensive...
CVE-2024-36469
- EPSS 0.12%
- Veröffentlicht 02.04.2025 07:15:40
- Zuletzt bearbeitet 03.11.2025 20:16:14
Execution time for an unsuccessful login differs when using a non-existing username compared to using an existing one.
CVE-2024-36465
- EPSS 2.18%
- Veröffentlicht 02.04.2025 06:15:34
- Zuletzt bearbeitet 08.10.2025 15:31:44
A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.
CVE-2024-36466
- EPSS 0.25%
- Veröffentlicht 28.11.2024 08:15:05
- Zuletzt bearbeitet 08.10.2025 15:31:30
A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.
CVE-2024-36464
- EPSS 0.07%
- Veröffentlicht 27.11.2024 14:15:17
- Zuletzt bearbeitet 03.11.2025 22:16:58
When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be exp...
CVE-2024-42330
- EPSS 0.23%
- Veröffentlicht 27.11.2024 12:15:21
- Zuletzt bearbeitet 03.11.2025 22:18:04
The HttpRequest object allows to get the HTTP headers from the server's response after sending the request. The problem is that the returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScrip...
CVE-2024-42331
- EPSS 0.05%
- Veröffentlicht 27.11.2024 12:15:21
- Zuletzt bearbeitet 03.11.2025 22:18:04
In the src/libs/zbxembed/browser.c file, the es_browser_ctor method retrieves a heap pointer from the Duktape JavaScript engine. This heap pointer is subsequently utilized by the browser_push_error method in the src/libs/zbxembed/browser_error.c file...
CVE-2024-42332
- EPSS 0.43%
- Veröffentlicht 27.11.2024 12:15:21
- Zuletzt bearbeitet 03.11.2025 22:18:05
The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacke...