Search CVE reports


Toggle filters

11 – 20 of 107 results


CVE-2024-42325

Medium priority
Needs evaluation

Zabbix API user.get returns all users that share common group with the calling user. This includes media and other information, such as login attempts, etc.

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-36469

Medium priority
Needs evaluation

Execution time for an unsuccessful login differs when using a non-existing username compared to using an existing one.

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-36468

Medium priority
Needs evaluation

The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session->securityEngineID to local_record.engineid...

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-36467

Medium priority
Needs evaluation

An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators),...

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-36466

Medium priority
Needs evaluation

A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-36465

Medium priority
Needs evaluation

A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-36464

Medium priority
Needs evaluation

When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and...

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-36463

Medium priority
Needs evaluation

The implementation of atob in "Zabbix JS" allows to create a string with arbitrary content and use it to access internal properties of objects.

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-36462

Medium priority
Needs evaluation

Uncontrolled resource consumption refers to a software vulnerability where a attacker or system uses excessive resources, such as CPU, memory, or network bandwidth, without proper limitations or controls. This can cause...

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-36461

Medium priority
Needs evaluation

Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine.

1 affected package

zabbix

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
zabbix Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages