Search CVE reports
11 – 20 of 107 results
Zabbix API user.get returns all users that share common group with the calling user. This includes media and other information, such as login attempts, etc.
1 affected package
zabbix
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
Execution time for an unsuccessful login differs when using a non-existing username compared to using an existing one.
1 affected package
zabbix
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session->securityEngineID to local_record.engineid...
1 affected package
zabbix
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators),...
1 affected package
zabbix
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.
1 affected package
zabbix
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.
1 affected package
zabbix
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and...
1 affected package
zabbix
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
The implementation of atob in "Zabbix JS" allows to create a string with arbitrary content and use it to access internal properties of objects.
1 affected package
zabbix
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
Uncontrolled resource consumption refers to a software vulnerability where a attacker or system uses excessive resources, such as CPU, memory, or network bandwidth, without proper limitations or controls. This can cause...
1 affected package
zabbix
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine.
1 affected package
zabbix
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
zabbix | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |