Lucene search

K
ZabbixZabbix

15 matches found

CVE
CVE
added 2022/01/13 4:15 p.m.1662 views

CVE-2022-23131

In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to...

9.8CVSS9.8AI score0.94344EPSS
CVE
CVE
added 2024/08/12 1:38 p.m.187 views

CVE-2024-22116

An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.

9.9CVSS9.8AI score0.00925EPSS
CVE
CVE
added 2020/10/07 4:15 p.m.171 views

CVE-2020-11800

Zabbix Server 2.2.x and 3.0.x before 3.0.31, and 3.2 allows remote attackers to execute arbitrary code.

9.8CVSS9.6AI score0.47881EPSS
CVE
CVE
added 2019/10/09 2:15 p.m.141 views

CVE-2019-17382

An issue was discovered in zabbix.php?action=dashboard.view&dashboardid=1 in Zabbix through 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any Username/Password (i.e., anonymously). All created elements (Dashboar...

9.1CVSS9AI score0.93651EPSS
CVE
CVE
added 2017/02/17 2:59 a.m.99 views

CVE-2016-10134

SQL injection vulnerability in Zabbix before 2.2.14 and 3.0 before 3.0.4 allows remote attackers to execute arbitrary SQL commands via the toggle_ids array parameter in latest.php.

9.8CVSS9.8AI score0.88001EPSS
CVE
CVE
added 2023/10/12 7:15 a.m.90 views

CVE-2023-32724

Memory pointer is in a property of the Ducktape object. This leads to multiple vulnerabilities related to direct memory access and manipulation.

9.1CVSS9.1AI score0.0033EPSS
CVE
CVE
added 2019/12/11 7:15 p.m.88 views

CVE-2013-5743

Multiple SQL injection vulnerabilities in Zabbix 1.8.x before 1.8.18rc1, 2.0.x before 2.0.9rc1, and 2.1.x before 2.1.7.

9.8CVSS9.9AI score0.82373EPSS
CVE
CVE
added 2022/12/12 1:49 a.m.82 views

CVE-2022-43516

A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI)

9.8CVSS7.9AI score0.00957EPSS
CVE
CVE
added 2018/02/01 5:29 p.m.76 views

CVE-2014-3005

XML external entity (XXE) vulnerability in Zabbix 1.8.x before 1.8.21rc1, 2.0.x before 2.0.13rc1, 2.2.x before 2.2.5rc1, and 2.3.x before 2.3.2 allows remote attackers to read arbitrary files or potentially execute arbitrary code via a crafted DTD in an XML request.

9.8CVSS9.3AI score0.04506EPSS
CVE
CVE
added 2023/10/12 7:15 a.m.74 views

CVE-2023-32722

The zabbix/src/libs/zbxjson module is vulnerable to a buffer overflow when parsing JSON files via zbx_json_open.

9.6CVSS8.7AI score0.00272EPSS
CVE
CVE
added 2024/08/12 1:38 p.m.63 views

CVE-2024-22122

Zabbix allows to configure SMS notifications. AT command injection occurs on "Zabbix Server" because there is no validation of "Number" field on Web nor on Zabbix server side. Attacker can run test of SMS providing specially crafted phone number and execute additional AT commands on modem.

9.1CVSS4.6AI score0.00354EPSS
CVE
CVE
added 2023/10/12 7:15 a.m.60 views

CVE-2023-32723

Request to LDAP is sent before user permissions are checked.

9.1CVSS8.9AI score0.0008EPSS
CVE
CVE
added 2020/02/17 4:15 p.m.55 views

CVE-2013-3738

A File Inclusion vulnerability exists in Zabbix 2.0.6 due to inadequate sanitization of request strings in CGI scripts, which could let a remote malicious user execute arbitrary code.

9.8CVSS9.5AI score0.02855EPSS
CVE
CVE
added 2024/08/12 1:38 p.m.53 views

CVE-2024-36461

Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine.

9.1CVSS9.2AI score0.00346EPSS
CVE
CVE
added 2009/12/31 6:30 p.m.49 views

CVE-2009-4502

The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attack...

9.3CVSS7.6AI score0.63545EPSS