Filtered by vendor Zabbix
Subscriptions
Filtered by product Zabbix
Subscriptions
Total
65 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2009-4499 | 1 Zabbix | 1 Zabbix | 2024-09-16 | N/A |
SQL injection vulnerability in the get_history_lastid function in the nodewatcher component in Zabbix Server before 1.6.8 allows remote attackers to execute arbitrary SQL commands via a crafted request, possibly related to the send_history_last_id function in zabbix_server/trapper/nodehistory.c. | ||||
CVE-2022-40626 | 2 Fedoraproject, Zabbix | 2 Fedora, Zabbix | 2024-09-16 | 4.8 Medium |
An unauthenticated user can create a link with reflected Javascript code inside the backurl parameter and send it to other authenticated users in order to create a fake account with predefined login, password and role in Zabbix Frontend. | ||||
CVE-2022-23131 | 1 Zabbix | 1 Zabbix | 2024-09-16 | 9.1 Critical |
In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default). | ||||
CVE-2024-22116 | 1 Zabbix | 1 Zabbix | 2024-08-27 | 9.9 Critical |
An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure. | ||||
CVE-2024-36462 | 1 Zabbix | 1 Zabbix | 2024-08-12 | 7.5 High |
Uncontrolled resource consumption refers to a software vulnerability where a attacker or system uses excessive resources, such as CPU, memory, or network bandwidth, without proper limitations or controls. This can cause a denial-of-service (DoS) attack or degrade the performance of the affected system. | ||||
CVE-2024-36460 | 1 Zabbix | 1 Zabbix | 2024-08-12 | 8.1 High |
The front-end audit log allows viewing of unprotected plaintext passwords, where the passwords are displayed in plain text. | ||||
CVE-2006-6692 | 1 Zabbix | 1 Zabbix | 2024-08-07 | N/A |
Multiple format string vulnerabilities in zabbix before 20061006 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via format string specifiers in information that would be recorded in the system log using (1) zabbix_log or (2) zabbix_syslog. | ||||
CVE-2006-6693 | 1 Zabbix | 1 Zabbix | 2024-08-07 | N/A |
Multiple buffer overflows in zabbix before 20061006 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via long strings to the (1) zabbix_log and (2) zabbix_syslog functions. | ||||
CVE-2007-0640 | 1 Zabbix | 1 Zabbix | 2024-08-07 | N/A |
Buffer overflow in ZABBIX before 1.1.5 has unknown impact and attack vectors related to "SNMP IP addresses." | ||||
CVE-2008-1353 | 1 Zabbix | 1 Zabbix | 2024-08-07 | N/A |
zabbix_agentd in ZABBIX 1.4.4 allows remote attackers to cause a denial of service (CPU and connection consumption) via multiple vfs.file.cksum commands with a special device node such as /dev/urandom or /dev/zero. | ||||
CVE-2009-4498 | 1 Zabbix | 1 Zabbix | 2024-08-07 | N/A |
The node_process_command function in Zabbix Server before 1.8 allows remote attackers to execute arbitrary commands via a crafted request. | ||||
CVE-2010-5049 | 1 Zabbix | 1 Zabbix | 2024-08-07 | N/A |
SQL injection vulnerability in events.php in Zabbix 1.8.1 and earlier allows remote attackers to execute arbitrary SQL commands via the nav_time parameter. | ||||
CVE-2010-2790 | 1 Zabbix | 1 Zabbix | 2024-08-07 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in the formatQuery function in frontends/php/include/classes/class.curl.php in Zabbix before 1.8.3rc1 allow remote attackers to inject arbitrary web script or HTML via the (1) filter_set, (2) show_details, (3) filter_rst, or (4) txt_select parameters to the triggers page (tr_status.php). NOTE: some of these details are obtained from third party information. | ||||
CVE-2010-1277 | 1 Zabbix | 1 Zabbix | 2024-08-07 | N/A |
SQL injection vulnerability in the user.authenticate method in the API in Zabbix 1.8 before 1.8.2 allows remote attackers to execute arbitrary SQL commands via the user parameter in JSON data to api_jsonrpc.php. | ||||
CVE-2011-5027 | 1 Zabbix | 1 Zabbix | 2024-08-07 | N/A |
Cross-site scripting (XSS) vulnerability in ZABBIX before 1.8.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the profiler. | ||||
CVE-2011-4615 | 1 Zabbix | 1 Zabbix | 2024-08-07 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in Zabbix before 1.8.10 allow remote attackers to inject arbitrary web script or HTML via the gname parameter (aka host groups name) to (1) hostgroups.php and (2) usergrps.php, the update action to (3) hosts.php and (4) scripts.php, and (5) maintenance.php. | ||||
CVE-2011-4674 | 1 Zabbix | 1 Zabbix | 2024-08-07 | N/A |
SQL injection vulnerability in popup.php in Zabbix 1.8.3 and 1.8.4, and possibly other versions before 1.8.9, allows remote attackers to execute arbitrary SQL commands via the only_hostid parameter. | ||||
CVE-2011-3263 | 1 Zabbix | 1 Zabbix | 2024-08-06 | N/A |
zabbix_agentd in Zabbix before 1.8.6 and 1.9.x before 1.9.4 allows context-dependent attackers to cause a denial of service (CPU consumption) by executing the vfs.file.cksum command for a special device, as demonstrated by the /dev/urandom device. | ||||
CVE-2011-3265 | 1 Zabbix | 1 Zabbix | 2024-08-06 | N/A |
popup.php in Zabbix before 1.8.7 allows remote attackers to read the contents of arbitrary database tables via a modified srctbl parameter. | ||||
CVE-2011-3264 | 1 Zabbix | 1 Zabbix | 2024-08-06 | N/A |
Zabbix before 1.8.6 allows remote attackers to obtain sensitive information via an invalid srcfld2 parameter to popup.php, which reveals the installation path in an error message. |