Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
Typedeb
Namespacedebian
Namezabbix
Version1:6.0.23+dfsg-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1:6.0.24+dfsg-1
Latest_non_vulnerable_version1:7.0.22+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-464s-8ex9-kqdz
vulnerability_id VCID-464s-8ex9-kqdz
summary A stored XSS has been found in the Zabbix web application in the Maps element if a URL field is set with spaces before URL.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32721
reference_id
reference_type
scores
0
value 0.00715
scoring_system epss
scoring_elements 0.72306
published_at 2026-04-02T12:55:00Z
1
value 0.00715
scoring_system epss
scoring_elements 0.72324
published_at 2026-04-04T12:55:00Z
2
value 0.00715
scoring_system epss
scoring_elements 0.72301
published_at 2026-04-07T12:55:00Z
3
value 0.00715
scoring_system epss
scoring_elements 0.7234
published_at 2026-04-08T12:55:00Z
4
value 0.00715
scoring_system epss
scoring_elements 0.72352
published_at 2026-04-09T12:55:00Z
5
value 0.00715
scoring_system epss
scoring_elements 0.72375
published_at 2026-04-11T12:55:00Z
6
value 0.00715
scoring_system epss
scoring_elements 0.72358
published_at 2026-04-12T12:55:00Z
7
value 0.00715
scoring_system epss
scoring_elements 0.72346
published_at 2026-04-13T12:55:00Z
8
value 0.00715
scoring_system epss
scoring_elements 0.72387
published_at 2026-04-16T12:55:00Z
9
value 0.00715
scoring_system epss
scoring_elements 0.72397
published_at 2026-04-18T12:55:00Z
10
value 0.00715
scoring_system epss
scoring_elements 0.72384
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32721
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32721
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877
reference_id 1053877
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5nmy-hdh8-xbg1
1
vulnerability VCID-cdyd-79m9-pyhv
2
vulnerability VCID-dej6-dxbp-a3bt
3
vulnerability VCID-fxqr-51kp-3ber
4
vulnerability VCID-qzp5-px2f-vqc8
5
vulnerability VCID-qzzk-mcfu-sfhv
6
vulnerability VCID-r8yr-aet5-yydn
7
vulnerability VCID-s1mb-1gsj-pbed
8
vulnerability VCID-uh37-bv9z-1bdz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-32721
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-464s-8ex9-kqdz
1
url VCID-4uxg-fxv7-rua8
vulnerability_id VCID-4uxg-fxv7-rua8
summary An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32727
reference_id
reference_type
scores
0
value 0.00464
scoring_system epss
scoring_elements 0.6436
published_at 2026-04-21T12:55:00Z
1
value 0.00464
scoring_system epss
scoring_elements 0.64302
published_at 2026-04-02T12:55:00Z
2
value 0.00464
scoring_system epss
scoring_elements 0.64322
published_at 2026-04-13T12:55:00Z
3
value 0.00464
scoring_system epss
scoring_elements 0.64358
published_at 2026-04-16T12:55:00Z
4
value 0.00464
scoring_system epss
scoring_elements 0.64369
published_at 2026-04-18T12:55:00Z
5
value 0.00464
scoring_system epss
scoring_elements 0.64331
published_at 2026-04-04T12:55:00Z
6
value 0.00464
scoring_system epss
scoring_elements 0.64287
published_at 2026-04-07T12:55:00Z
7
value 0.00464
scoring_system epss
scoring_elements 0.64335
published_at 2026-04-08T12:55:00Z
8
value 0.00464
scoring_system epss
scoring_elements 0.6435
published_at 2026-04-09T12:55:00Z
9
value 0.00464
scoring_system epss
scoring_elements 0.64363
published_at 2026-04-11T12:55:00Z
10
value 0.00464
scoring_system epss
scoring_elements 0.64351
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32727
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32727
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://support.zabbix.com/browse/ZBX-23857
reference_id ZBX-23857
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:37:31Z/
url https://support.zabbix.com/browse/ZBX-23857
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5nmy-hdh8-xbg1
1
vulnerability VCID-cdyd-79m9-pyhv
2
vulnerability VCID-dej6-dxbp-a3bt
3
vulnerability VCID-fxqr-51kp-3ber
4
vulnerability VCID-qzp5-px2f-vqc8
5
vulnerability VCID-qzzk-mcfu-sfhv
6
vulnerability VCID-r8yr-aet5-yydn
7
vulnerability VCID-s1mb-1gsj-pbed
8
vulnerability VCID-uh37-bv9z-1bdz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-32727
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4uxg-fxv7-rua8
2
url VCID-547a-p94b-6fep
vulnerability_id VCID-547a-p94b-6fep
summary The zabbix/src/libs/zbxjson module is vulnerable to a buffer overflow when parsing JSON files via zbx_json_open.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32722
reference_id
reference_type
scores
0
value 0.00357
scoring_system epss
scoring_elements 0.58005
published_at 2026-04-21T12:55:00Z
1
value 0.00357
scoring_system epss
scoring_elements 0.57972
published_at 2026-04-02T12:55:00Z
2
value 0.00357
scoring_system epss
scoring_elements 0.57999
published_at 2026-04-13T12:55:00Z
3
value 0.00357
scoring_system epss
scoring_elements 0.58029
published_at 2026-04-16T12:55:00Z
4
value 0.00357
scoring_system epss
scoring_elements 0.58028
published_at 2026-04-18T12:55:00Z
5
value 0.00357
scoring_system epss
scoring_elements 0.5799
published_at 2026-04-04T12:55:00Z
6
value 0.00357
scoring_system epss
scoring_elements 0.57966
published_at 2026-04-07T12:55:00Z
7
value 0.00357
scoring_system epss
scoring_elements 0.58022
published_at 2026-04-08T12:55:00Z
8
value 0.00357
scoring_system epss
scoring_elements 0.58024
published_at 2026-04-09T12:55:00Z
9
value 0.00357
scoring_system epss
scoring_elements 0.58041
published_at 2026-04-11T12:55:00Z
10
value 0.00357
scoring_system epss
scoring_elements 0.58019
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32722
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32722
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877
reference_id 1053877
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877
4
reference_url https://support.zabbix.com/browse/ZBX-23390
reference_id ZBX-23390
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-18T15:26:49Z/
url https://support.zabbix.com/browse/ZBX-23390
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5nmy-hdh8-xbg1
1
vulnerability VCID-cdyd-79m9-pyhv
2
vulnerability VCID-dej6-dxbp-a3bt
3
vulnerability VCID-fxqr-51kp-3ber
4
vulnerability VCID-qzp5-px2f-vqc8
5
vulnerability VCID-qzzk-mcfu-sfhv
6
vulnerability VCID-r8yr-aet5-yydn
7
vulnerability VCID-s1mb-1gsj-pbed
8
vulnerability VCID-uh37-bv9z-1bdz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-32722
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-547a-p94b-6fep
3
url VCID-5s7j-6aea-qucr
vulnerability_id VCID-5s7j-6aea-qucr
summary Stored or persistent cross-site scripting (XSS) is a type of XSS where the attacker first sends the payload to the web application, then the application saves the payload (e.g., in a database or server-side text files), and finally, the application unintentionally executes the payload for every victim visiting its web pages.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29454
reference_id
reference_type
scores
0
value 0.00646
scoring_system epss
scoring_elements 0.70673
published_at 2026-04-04T12:55:00Z
1
value 0.00646
scoring_system epss
scoring_elements 0.70654
published_at 2026-04-02T12:55:00Z
2
value 0.00807
scoring_system epss
scoring_elements 0.74209
published_at 2026-04-21T12:55:00Z
3
value 0.00807
scoring_system epss
scoring_elements 0.74177
published_at 2026-04-12T12:55:00Z
4
value 0.00807
scoring_system epss
scoring_elements 0.7417
published_at 2026-04-13T12:55:00Z
5
value 0.00807
scoring_system epss
scoring_elements 0.74208
published_at 2026-04-16T12:55:00Z
6
value 0.00807
scoring_system epss
scoring_elements 0.74217
published_at 2026-04-18T12:55:00Z
7
value 0.00807
scoring_system epss
scoring_elements 0.74126
published_at 2026-04-07T12:55:00Z
8
value 0.00807
scoring_system epss
scoring_elements 0.74159
published_at 2026-04-08T12:55:00Z
9
value 0.00807
scoring_system epss
scoring_elements 0.74174
published_at 2026-04-09T12:55:00Z
10
value 0.00807
scoring_system epss
scoring_elements 0.74195
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29454
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29454
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
reference_id 1055175
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
3
reference_url https://support.zabbix.com/browse/ZBX-22985
reference_id ZBX-22985
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T21:06:47Z/
url https://support.zabbix.com/browse/ZBX-22985
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5nmy-hdh8-xbg1
1
vulnerability VCID-cdyd-79m9-pyhv
2
vulnerability VCID-dej6-dxbp-a3bt
3
vulnerability VCID-fxqr-51kp-3ber
4
vulnerability VCID-qzp5-px2f-vqc8
5
vulnerability VCID-qzzk-mcfu-sfhv
6
vulnerability VCID-r8yr-aet5-yydn
7
vulnerability VCID-s1mb-1gsj-pbed
8
vulnerability VCID-uh37-bv9z-1bdz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-29454
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5s7j-6aea-qucr
4
url VCID-673b-qsd3-e3hz
vulnerability_id VCID-673b-qsd3-e3hz
summary Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script is activated through a link, which sends a request to a website with a vulnerability that enables execution of malicious scripts.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29455
reference_id
reference_type
scores
0
value 0.00917
scoring_system epss
scoring_elements 0.75899
published_at 2026-04-04T12:55:00Z
1
value 0.00917
scoring_system epss
scoring_elements 0.75866
published_at 2026-04-02T12:55:00Z
2
value 0.01219
scoring_system epss
scoring_elements 0.79081
published_at 2026-04-21T12:55:00Z
3
value 0.01219
scoring_system epss
scoring_elements 0.79068
published_at 2026-04-12T12:55:00Z
4
value 0.01219
scoring_system epss
scoring_elements 0.79058
published_at 2026-04-13T12:55:00Z
5
value 0.01219
scoring_system epss
scoring_elements 0.79085
published_at 2026-04-16T12:55:00Z
6
value 0.01219
scoring_system epss
scoring_elements 0.79082
published_at 2026-04-18T12:55:00Z
7
value 0.01219
scoring_system epss
scoring_elements 0.79028
published_at 2026-04-07T12:55:00Z
8
value 0.01219
scoring_system epss
scoring_elements 0.79052
published_at 2026-04-08T12:55:00Z
9
value 0.01219
scoring_system epss
scoring_elements 0.79059
published_at 2026-04-09T12:55:00Z
10
value 0.01219
scoring_system epss
scoring_elements 0.79083
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29455
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29455
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
reference_id 1055175
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
3
reference_url https://support.zabbix.com/browse/ZBX-22986
reference_id ZBX-22986
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T21:06:45Z/
url https://support.zabbix.com/browse/ZBX-22986
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5nmy-hdh8-xbg1
1
vulnerability VCID-cdyd-79m9-pyhv
2
vulnerability VCID-dej6-dxbp-a3bt
3
vulnerability VCID-fxqr-51kp-3ber
4
vulnerability VCID-qzp5-px2f-vqc8
5
vulnerability VCID-qzzk-mcfu-sfhv
6
vulnerability VCID-r8yr-aet5-yydn
7
vulnerability VCID-s1mb-1gsj-pbed
8
vulnerability VCID-uh37-bv9z-1bdz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-29455
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-673b-qsd3-e3hz
5
url VCID-6u3x-x7qt-g3fa
vulnerability_id VCID-6u3x-x7qt-g3fa
summary JavaScript preprocessing, webhooks and global scripts can cause uncontrolled CPU, memory, and disk I/O utilization. Preprocessing/webhook/global script configuration and testing are only available to Administrative roles (Admin and Superadmin). Administrative privileges should be typically granted to users who need to perform tasks that require more control over the system. The security risk is limited because not all users have this level of access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29449
reference_id
reference_type
scores
0
value 0.00755
scoring_system epss
scoring_elements 0.73212
published_at 2026-04-04T12:55:00Z
1
value 0.00755
scoring_system epss
scoring_elements 0.73191
published_at 2026-04-02T12:55:00Z
2
value 0.0086
scoring_system epss
scoring_elements 0.75049
published_at 2026-04-21T12:55:00Z
3
value 0.0086
scoring_system epss
scoring_elements 0.75015
published_at 2026-04-13T12:55:00Z
4
value 0.0086
scoring_system epss
scoring_elements 0.75051
published_at 2026-04-16T12:55:00Z
5
value 0.0086
scoring_system epss
scoring_elements 0.75059
published_at 2026-04-18T12:55:00Z
6
value 0.0086
scoring_system epss
scoring_elements 0.7498
published_at 2026-04-07T12:55:00Z
7
value 0.0086
scoring_system epss
scoring_elements 0.75014
published_at 2026-04-08T12:55:00Z
8
value 0.0086
scoring_system epss
scoring_elements 0.75026
published_at 2026-04-12T12:55:00Z
9
value 0.0086
scoring_system epss
scoring_elements 0.75047
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29449
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29449
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
reference_id 1055175
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
4
reference_url https://support.zabbix.com/browse/ZBX-22589
reference_id ZBX-22589
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:25:49Z/
url https://support.zabbix.com/browse/ZBX-22589
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5nmy-hdh8-xbg1
1
vulnerability VCID-cdyd-79m9-pyhv
2
vulnerability VCID-dej6-dxbp-a3bt
3
vulnerability VCID-fxqr-51kp-3ber
4
vulnerability VCID-qzp5-px2f-vqc8
5
vulnerability VCID-qzzk-mcfu-sfhv
6
vulnerability VCID-r8yr-aet5-yydn
7
vulnerability VCID-s1mb-1gsj-pbed
8
vulnerability VCID-uh37-bv9z-1bdz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-29449
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6u3x-x7qt-g3fa
6
url VCID-9z8h-gg7t-b7f8
vulnerability_id VCID-9z8h-gg7t-b7f8
summary Memory pointer is in a property of the Ducktape object. This leads to multiple vulnerabilities related to direct memory access and manipulation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32724
reference_id
reference_type
scores
0
value 0.0072
scoring_system epss
scoring_elements 0.72509
published_at 2026-04-21T12:55:00Z
1
value 0.0072
scoring_system epss
scoring_elements 0.72519
published_at 2026-04-18T12:55:00Z
2
value 0.0072
scoring_system epss
scoring_elements 0.72428
published_at 2026-04-02T12:55:00Z
3
value 0.0072
scoring_system epss
scoring_elements 0.72446
published_at 2026-04-04T12:55:00Z
4
value 0.0072
scoring_system epss
scoring_elements 0.72422
published_at 2026-04-07T12:55:00Z
5
value 0.0072
scoring_system epss
scoring_elements 0.72461
published_at 2026-04-08T12:55:00Z
6
value 0.0072
scoring_system epss
scoring_elements 0.72474
published_at 2026-04-09T12:55:00Z
7
value 0.0072
scoring_system epss
scoring_elements 0.72496
published_at 2026-04-11T12:55:00Z
8
value 0.0072
scoring_system epss
scoring_elements 0.72478
published_at 2026-04-12T12:55:00Z
9
value 0.0072
scoring_system epss
scoring_elements 0.72469
published_at 2026-04-13T12:55:00Z
10
value 0.0072
scoring_system epss
scoring_elements 0.7251
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32724
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32724
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877
reference_id 1053877
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877
3
reference_url https://support.zabbix.com/browse/ZBX-23391
reference_id ZBX-23391
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:43:17Z/
url https://support.zabbix.com/browse/ZBX-23391
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5nmy-hdh8-xbg1
1
vulnerability VCID-cdyd-79m9-pyhv
2
vulnerability VCID-dej6-dxbp-a3bt
3
vulnerability VCID-fxqr-51kp-3ber
4
vulnerability VCID-qzp5-px2f-vqc8
5
vulnerability VCID-qzzk-mcfu-sfhv
6
vulnerability VCID-r8yr-aet5-yydn
7
vulnerability VCID-s1mb-1gsj-pbed
8
vulnerability VCID-uh37-bv9z-1bdz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-32724
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9z8h-gg7t-b7f8
7
url VCID-cdyd-79m9-pyhv
vulnerability_id VCID-cdyd-79m9-pyhv
summary Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g., "var a = {{.}}"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template. Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29453
reference_id
reference_type
scores
0
value 0.00559
scoring_system epss
scoring_elements 0.68277
published_at 2026-04-21T12:55:00Z
1
value 0.00559
scoring_system epss
scoring_elements 0.68297
published_at 2026-04-18T12:55:00Z
2
value 0.00559
scoring_system epss
scoring_elements 0.68207
published_at 2026-04-02T12:55:00Z
3
value 0.00559
scoring_system epss
scoring_elements 0.68225
published_at 2026-04-04T12:55:00Z
4
value 0.00559
scoring_system epss
scoring_elements 0.68201
published_at 2026-04-07T12:55:00Z
5
value 0.00559
scoring_system epss
scoring_elements 0.68252
published_at 2026-04-08T12:55:00Z
6
value 0.00559
scoring_system epss
scoring_elements 0.68267
published_at 2026-04-09T12:55:00Z
7
value 0.00559
scoring_system epss
scoring_elements 0.68293
published_at 2026-04-11T12:55:00Z
8
value 0.00559
scoring_system epss
scoring_elements 0.6828
published_at 2026-04-12T12:55:00Z
9
value 0.00559
scoring_system epss
scoring_elements 0.68246
published_at 2026-04-13T12:55:00Z
10
value 0.00559
scoring_system epss
scoring_elements 0.68286
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29453
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29453
2
reference_url https://support.zabbix.com/browse/ZBX-23388
reference_id ZBX-23388
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-18T15:17:42Z/
url https://support.zabbix.com/browse/ZBX-23388
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie
2
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-29453
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cdyd-79m9-pyhv
8
url VCID-cuqx-wxkd-nffa
vulnerability_id VCID-cuqx-wxkd-nffa
summary Duktape is an 3rd-party embeddable JavaScript engine, with a focus on portability and compact footprint. When adding too many values in valstack JavaScript will crash. This issue occurs due to bug in Duktape 2.6 which is an 3rd-party solution that we use.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29458
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.28309
published_at 2026-04-04T12:55:00Z
1
value 0.00103
scoring_system epss
scoring_elements 0.28265
published_at 2026-04-02T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32199
published_at 2026-04-21T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32249
published_at 2026-04-16T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32229
published_at 2026-04-18T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32206
published_at 2026-04-07T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.32254
published_at 2026-04-08T12:55:00Z
7
value 0.00128
scoring_system epss
scoring_elements 0.32284
published_at 2026-04-09T12:55:00Z
8
value 0.00128
scoring_system epss
scoring_elements 0.32285
published_at 2026-04-11T12:55:00Z
9
value 0.00128
scoring_system epss
scoring_elements 0.32247
published_at 2026-04-12T12:55:00Z
10
value 0.00128
scoring_system epss
scoring_elements 0.32216
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29458
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29458
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
reference_id 1055175
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
3
reference_url https://support.zabbix.com/browse/ZBX-22989
reference_id ZBX-22989
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:19:37Z/
url https://support.zabbix.com/browse/ZBX-22989
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5nmy-hdh8-xbg1
1
vulnerability VCID-cdyd-79m9-pyhv
2
vulnerability VCID-dej6-dxbp-a3bt
3
vulnerability VCID-fxqr-51kp-3ber
4
vulnerability VCID-qzp5-px2f-vqc8
5
vulnerability VCID-qzzk-mcfu-sfhv
6
vulnerability VCID-r8yr-aet5-yydn
7
vulnerability VCID-s1mb-1gsj-pbed
8
vulnerability VCID-uh37-bv9z-1bdz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-29458
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cuqx-wxkd-nffa
9
url VCID-ftt2-5jnt-9ye2
vulnerability_id VCID-ftt2-5jnt-9ye2
summary Reflected XSS attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script can be activated through Action form fields, which can be sent as request to a website with a vulnerability that enables execution of malicious scripts.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29457
reference_id
reference_type
scores
0
value 0.00367
scoring_system epss
scoring_elements 0.58661
published_at 2026-04-04T12:55:00Z
1
value 0.00367
scoring_system epss
scoring_elements 0.5864
published_at 2026-04-02T12:55:00Z
2
value 0.0049
scoring_system epss
scoring_elements 0.65591
published_at 2026-04-21T12:55:00Z
3
value 0.0049
scoring_system epss
scoring_elements 0.656
published_at 2026-04-11T12:55:00Z
4
value 0.0049
scoring_system epss
scoring_elements 0.65586
published_at 2026-04-12T12:55:00Z
5
value 0.0049
scoring_system epss
scoring_elements 0.65558
published_at 2026-04-13T12:55:00Z
6
value 0.0049
scoring_system epss
scoring_elements 0.65594
published_at 2026-04-16T12:55:00Z
7
value 0.0049
scoring_system epss
scoring_elements 0.65607
published_at 2026-04-18T12:55:00Z
8
value 0.0049
scoring_system epss
scoring_elements 0.65516
published_at 2026-04-07T12:55:00Z
9
value 0.0049
scoring_system epss
scoring_elements 0.65569
published_at 2026-04-08T12:55:00Z
10
value 0.0049
scoring_system epss
scoring_elements 0.65581
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29457
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29457
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29457
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
reference_id 1055175
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
4
reference_url https://support.zabbix.com/browse/ZBX-22988
reference_id ZBX-22988
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T21:06:43Z/
url https://support.zabbix.com/browse/ZBX-22988
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5nmy-hdh8-xbg1
1
vulnerability VCID-cdyd-79m9-pyhv
2
vulnerability VCID-dej6-dxbp-a3bt
3
vulnerability VCID-fxqr-51kp-3ber
4
vulnerability VCID-qzp5-px2f-vqc8
5
vulnerability VCID-qzzk-mcfu-sfhv
6
vulnerability VCID-r8yr-aet5-yydn
7
vulnerability VCID-s1mb-1gsj-pbed
8
vulnerability VCID-uh37-bv9z-1bdz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-29457
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ftt2-5jnt-9ye2
10
url VCID-gyqk-zsww-ykdj
vulnerability_id VCID-gyqk-zsww-ykdj
summary Specially crafted string can cause a buffer overrun in the JSON parser library leading to a crash of the Zabbix Server or a Zabbix Proxy.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29451
reference_id
reference_type
scores
0
value 0.0011
scoring_system epss
scoring_elements 0.29542
published_at 2026-04-04T12:55:00Z
1
value 0.0011
scoring_system epss
scoring_elements 0.29494
published_at 2026-04-02T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.31801
published_at 2026-04-21T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31891
published_at 2026-04-11T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31852
published_at 2026-04-12T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31817
published_at 2026-04-13T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31849
published_at 2026-04-16T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31829
published_at 2026-04-18T12:55:00Z
8
value 0.00126
scoring_system epss
scoring_elements 0.31807
published_at 2026-04-07T12:55:00Z
9
value 0.00126
scoring_system epss
scoring_elements 0.3186
published_at 2026-04-08T12:55:00Z
10
value 0.00126
scoring_system epss
scoring_elements 0.31888
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29451
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
reference_id 1055175
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
3
reference_url https://support.zabbix.com/browse/ZBX-22587
reference_id ZBX-22587
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:25:43Z/
url https://support.zabbix.com/browse/ZBX-22587
fixed_packages
0
url pkg:deb/debian/zabbix@0?distro=trixie
purl pkg:deb/debian/zabbix@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie
1
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5nmy-hdh8-xbg1
1
vulnerability VCID-cdyd-79m9-pyhv
2
vulnerability VCID-dej6-dxbp-a3bt
3
vulnerability VCID-fxqr-51kp-3ber
4
vulnerability VCID-qzp5-px2f-vqc8
5
vulnerability VCID-qzzk-mcfu-sfhv
6
vulnerability VCID-r8yr-aet5-yydn
7
vulnerability VCID-s1mb-1gsj-pbed
8
vulnerability VCID-uh37-bv9z-1bdz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie
2
url pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-29451
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gyqk-zsww-ykdj
11
url VCID-kx3g-p2zj-duaj
vulnerability_id VCID-kx3g-p2zj-duaj
summary URL validation scheme receives input from a user and then parses it to identify its various components. The validation scheme can ensure that all URL components comply with internet standards.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29456
reference_id
reference_type
scores
0
value 0.00122
scoring_system epss
scoring_elements 0.31519
published_at 2026-04-04T12:55:00Z
1
value 0.00122
scoring_system epss
scoring_elements 0.31478
published_at 2026-04-02T12:55:00Z
2
value 0.00153
scoring_system epss
scoring_elements 0.35989
published_at 2026-04-21T12:55:00Z
3
value 0.00153
scoring_system epss
scoring_elements 0.36042
published_at 2026-04-12T12:55:00Z
4
value 0.00153
scoring_system epss
scoring_elements 0.36016
published_at 2026-04-13T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.36055
published_at 2026-04-16T12:55:00Z
6
value 0.00153
scoring_system epss
scoring_elements 0.36041
published_at 2026-04-18T12:55:00Z
7
value 0.00153
scoring_system epss
scoring_elements 0.36006
published_at 2026-04-07T12:55:00Z
8
value 0.00153
scoring_system epss
scoring_elements 0.36056
published_at 2026-04-08T12:55:00Z
9
value 0.00153
scoring_system epss
scoring_elements 0.36074
published_at 2026-04-09T12:55:00Z
10
value 0.00153
scoring_system epss
scoring_elements 0.36081
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29456
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29456
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
reference_id 1055175
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
3
reference_url https://support.zabbix.com/browse/ZBX-22987
reference_id ZBX-22987
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:19:48Z/
url https://support.zabbix.com/browse/ZBX-22987
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5nmy-hdh8-xbg1
1
vulnerability VCID-cdyd-79m9-pyhv
2
vulnerability VCID-dej6-dxbp-a3bt
3
vulnerability VCID-fxqr-51kp-3ber
4
vulnerability VCID-qzp5-px2f-vqc8
5
vulnerability VCID-qzzk-mcfu-sfhv
6
vulnerability VCID-r8yr-aet5-yydn
7
vulnerability VCID-s1mb-1gsj-pbed
8
vulnerability VCID-uh37-bv9z-1bdz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-29456
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kx3g-p2zj-duaj
12
url VCID-nyhx-57xy-wugc
vulnerability_id VCID-nyhx-57xy-wugc
summary Currently, geomap configuration (Administration -> General -> Geographical maps) allows using HTML in the field “Attribution text” when selected “Other” Tile provider.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29452
reference_id
reference_type
scores
0
value 0.01801
scoring_system epss
scoring_elements 0.82757
published_at 2026-04-04T12:55:00Z
1
value 0.01801
scoring_system epss
scoring_elements 0.82744
published_at 2026-04-02T12:55:00Z
2
value 0.01972
scoring_system epss
scoring_elements 0.83582
published_at 2026-04-21T12:55:00Z
3
value 0.01972
scoring_system epss
scoring_elements 0.8358
published_at 2026-04-16T12:55:00Z
4
value 0.01972
scoring_system epss
scoring_elements 0.83581
published_at 2026-04-18T12:55:00Z
5
value 0.01972
scoring_system epss
scoring_elements 0.83507
published_at 2026-04-07T12:55:00Z
6
value 0.01972
scoring_system epss
scoring_elements 0.83531
published_at 2026-04-08T12:55:00Z
7
value 0.01972
scoring_system epss
scoring_elements 0.83541
published_at 2026-04-09T12:55:00Z
8
value 0.01972
scoring_system epss
scoring_elements 0.83556
published_at 2026-04-11T12:55:00Z
9
value 0.01972
scoring_system epss
scoring_elements 0.8355
published_at 2026-04-12T12:55:00Z
10
value 0.01972
scoring_system epss
scoring_elements 0.83545
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29452
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
reference_id 1055175
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
2
reference_url https://support.zabbix.com/browse/ZBX-22981
reference_id ZBX-22981
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:21:55Z/
url https://support.zabbix.com/browse/ZBX-22981
fixed_packages
0
url pkg:deb/debian/zabbix@0?distro=trixie
purl pkg:deb/debian/zabbix@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie
1
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5nmy-hdh8-xbg1
1
vulnerability VCID-cdyd-79m9-pyhv
2
vulnerability VCID-dej6-dxbp-a3bt
3
vulnerability VCID-fxqr-51kp-3ber
4
vulnerability VCID-qzp5-px2f-vqc8
5
vulnerability VCID-qzzk-mcfu-sfhv
6
vulnerability VCID-r8yr-aet5-yydn
7
vulnerability VCID-s1mb-1gsj-pbed
8
vulnerability VCID-uh37-bv9z-1bdz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie
2
url pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-29452
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nyhx-57xy-wugc
13
url VCID-r65p-6wkq-sfb9
vulnerability_id VCID-r65p-6wkq-sfb9
summary JavaScript pre-processing can be used by the attacker to gain access to the file system (read-only access on behalf of user "zabbix") on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29450
reference_id
reference_type
scores
0
value 0.00254
scoring_system epss
scoring_elements 0.48684
published_at 2026-04-04T12:55:00Z
1
value 0.00254
scoring_system epss
scoring_elements 0.48662
published_at 2026-04-02T12:55:00Z
2
value 0.00289
scoring_system epss
scoring_elements 0.52434
published_at 2026-04-18T12:55:00Z
3
value 0.00289
scoring_system epss
scoring_elements 0.52369
published_at 2026-04-09T12:55:00Z
4
value 0.00289
scoring_system epss
scoring_elements 0.52419
published_at 2026-04-21T12:55:00Z
5
value 0.00289
scoring_system epss
scoring_elements 0.52403
published_at 2026-04-12T12:55:00Z
6
value 0.00289
scoring_system epss
scoring_elements 0.52389
published_at 2026-04-13T12:55:00Z
7
value 0.00289
scoring_system epss
scoring_elements 0.52428
published_at 2026-04-16T12:55:00Z
8
value 0.00289
scoring_system epss
scoring_elements 0.52321
published_at 2026-04-07T12:55:00Z
9
value 0.00289
scoring_system epss
scoring_elements 0.52374
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29450
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29450
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
reference_id 1055175
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
4
reference_url https://support.zabbix.com/browse/ZBX-22588
reference_id ZBX-22588
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T14:20:54Z/
url https://support.zabbix.com/browse/ZBX-22588
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5nmy-hdh8-xbg1
1
vulnerability VCID-cdyd-79m9-pyhv
2
vulnerability VCID-dej6-dxbp-a3bt
3
vulnerability VCID-fxqr-51kp-3ber
4
vulnerability VCID-qzp5-px2f-vqc8
5
vulnerability VCID-qzzk-mcfu-sfhv
6
vulnerability VCID-r8yr-aet5-yydn
7
vulnerability VCID-s1mb-1gsj-pbed
8
vulnerability VCID-uh37-bv9z-1bdz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-29450
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r65p-6wkq-sfb9
14
url VCID-vkfp-asar-7bhw
vulnerability_id VCID-vkfp-asar-7bhw
summary The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32725
reference_id
reference_type
scores
0
value 0.00267
scoring_system epss
scoring_elements 0.50229
published_at 2026-04-21T12:55:00Z
1
value 0.00267
scoring_system epss
scoring_elements 0.50194
published_at 2026-04-02T12:55:00Z
2
value 0.00267
scoring_system epss
scoring_elements 0.50222
published_at 2026-04-04T12:55:00Z
3
value 0.00267
scoring_system epss
scoring_elements 0.50171
published_at 2026-04-07T12:55:00Z
4
value 0.00267
scoring_system epss
scoring_elements 0.50225
published_at 2026-04-08T12:55:00Z
5
value 0.00267
scoring_system epss
scoring_elements 0.50218
published_at 2026-04-09T12:55:00Z
6
value 0.00267
scoring_system epss
scoring_elements 0.50246
published_at 2026-04-11T12:55:00Z
7
value 0.00267
scoring_system epss
scoring_elements 0.5022
published_at 2026-04-12T12:55:00Z
8
value 0.00267
scoring_system epss
scoring_elements 0.50208
published_at 2026-04-13T12:55:00Z
9
value 0.00267
scoring_system epss
scoring_elements 0.50253
published_at 2026-04-16T12:55:00Z
10
value 0.00267
scoring_system epss
scoring_elements 0.50255
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32725
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/zabbix@0?distro=trixie
purl pkg:deb/debian/zabbix@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie
1
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5nmy-hdh8-xbg1
1
vulnerability VCID-cdyd-79m9-pyhv
2
vulnerability VCID-dej6-dxbp-a3bt
3
vulnerability VCID-fxqr-51kp-3ber
4
vulnerability VCID-qzp5-px2f-vqc8
5
vulnerability VCID-qzzk-mcfu-sfhv
6
vulnerability VCID-r8yr-aet5-yydn
7
vulnerability VCID-s1mb-1gsj-pbed
8
vulnerability VCID-uh37-bv9z-1bdz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie
2
url pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2023-32725
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vkfp-asar-7bhw
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie