CVE-2023-32723
- EPSS 0.13%
- Veröffentlicht 12.10.2023 07:15:10
- Zuletzt bearbeitet 21.11.2024 08:03:54
Request to LDAP is sent before user permissions are checked.
CVE-2023-32724
- EPSS 0.72%
- Veröffentlicht 12.10.2023 07:15:10
- Zuletzt bearbeitet 03.11.2025 22:16:22
Memory pointer is in a property of the Ducktape object. This leads to multiple vulnerabilities related to direct memory access and manipulation.
CVE-2023-32721
- EPSS 0.72%
- Veröffentlicht 12.10.2023 07:15:09
- Zuletzt bearbeitet 03.11.2025 22:16:21
A stored XSS has been found in the Zabbix web application in the Maps element if a URL field is set with spaces before URL.
CVE-2023-29451
- EPSS 0.13%
- Veröffentlicht 13.07.2023 10:15:09
- Zuletzt bearbeitet 21.11.2024 07:57:04
Specially crafted string can cause a buffer overrun in the JSON parser library leading to a crash of the Zabbix Server or a Zabbix Proxy.
CVE-2023-29452
- EPSS 1.99%
- Veröffentlicht 13.07.2023 10:15:09
- Zuletzt bearbeitet 21.11.2024 07:57:05
Currently, geomap configuration (Administration -> General -> Geographical maps) allows using HTML in the field “Attribution text” when selected “Other” Tile provider.
CVE-2023-29458
- EPSS 0.14%
- Veröffentlicht 13.07.2023 10:15:09
- Zuletzt bearbeitet 03.11.2025 22:16:07
Duktape is an 3rd-party embeddable JavaScript engine, with a focus on portability and compact footprint. When adding too many values in valstack JavaScript will crash. This issue occurs due to bug in Duktape 2.6 which is an 3rd-party solution that we...
CVE-2023-29449
- EPSS 0.86%
- Veröffentlicht 13.07.2023 09:15:09
- Zuletzt bearbeitet 03.11.2025 22:16:06
JavaScript preprocessing, webhooks and global scripts can cause uncontrolled CPU, memory, and disk I/O utilization. Preprocessing/webhook/global script configuration and testing are only available to Administrative roles (Admin and Superadmin). Admin...
CVE-2023-29450
- EPSS 0.31%
- Veröffentlicht 13.07.2023 09:15:09
- Zuletzt bearbeitet 03.11.2025 22:16:06
JavaScript pre-processing can be used by the attacker to gain access to the file system (read-only access on behalf of user "zabbix") on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data.
CVE-2022-43516
- EPSS 4.54%
- Veröffentlicht 05.12.2022 20:15:10
- Zuletzt bearbeitet 21.11.2024 07:26:41
A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI)
CVE-2022-40626
- EPSS 1.87%
- Veröffentlicht 14.09.2022 11:15:53
- Zuletzt bearbeitet 21.11.2024 07:21:44
An unauthenticated user can create a link with reflected Javascript code inside the backurl parameter and send it to other authenticated users in order to create a fake account with predefined login, password and role in Zabbix Frontend.