Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/zabbix@1:7.0.0%2Bdfsg-1?distro=trixie
Typedeb
Namespacedebian
Namezabbix
Version1:7.0.0+dfsg-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1:7.0.1+dfsg-1
Latest_non_vulnerable_version1:7.0.22+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-3qru-uxsd-e3c8
vulnerability_id VCID-3qru-uxsd-e3c8
summary Zabbix allows to configure SMS notifications. AT command injection occurs on "Zabbix Server" because there is no validation of "Number" field on Web nor on Zabbix server side. Attacker can run test of SMS providing specially crafted phone number and execute additional AT commands on modem.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-22122
reference_id
reference_type
scores
0
value 0.00438
scoring_system epss
scoring_elements 0.63136
published_at 2026-04-21T12:55:00Z
1
value 0.00438
scoring_system epss
scoring_elements 0.63113
published_at 2026-04-13T12:55:00Z
2
value 0.00438
scoring_system epss
scoring_elements 0.63148
published_at 2026-04-16T12:55:00Z
3
value 0.00438
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-18T12:55:00Z
4
value 0.00438
scoring_system epss
scoring_elements 0.6307
published_at 2026-04-02T12:55:00Z
5
value 0.00438
scoring_system epss
scoring_elements 0.631
published_at 2026-04-04T12:55:00Z
6
value 0.00438
scoring_system epss
scoring_elements 0.63064
published_at 2026-04-07T12:55:00Z
7
value 0.00438
scoring_system epss
scoring_elements 0.63116
published_at 2026-04-08T12:55:00Z
8
value 0.00438
scoring_system epss
scoring_elements 0.63133
published_at 2026-04-09T12:55:00Z
9
value 0.00438
scoring_system epss
scoring_elements 0.6315
published_at 2026-04-11T12:55:00Z
10
value 0.00438
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-22122
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22122
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553
reference_id 1078553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553
4
reference_url https://support.zabbix.com/browse/ZBX-25012
reference_id ZBX-25012
reference_type
scores
0
value 3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T14:46:40Z/
url https://support.zabbix.com/browse/ZBX-25012
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5nmy-hdh8-xbg1
1
vulnerability VCID-cdyd-79m9-pyhv
2
vulnerability VCID-dej6-dxbp-a3bt
3
vulnerability VCID-fxqr-51kp-3ber
4
vulnerability VCID-qzp5-px2f-vqc8
5
vulnerability VCID-qzzk-mcfu-sfhv
6
vulnerability VCID-r8yr-aet5-yydn
7
vulnerability VCID-s1mb-1gsj-pbed
8
vulnerability VCID-uh37-bv9z-1bdz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/zabbix@1:7.0.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.0%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2024-22122
risk_score 0.8
exploitability 0.5
weighted_severity 1.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3qru-uxsd-e3c8
1
url VCID-4s92-5es4-yka5
vulnerability_id VCID-4s92-5es4-yka5
summary User with no permission to any of the Hosts can access and view host count & other statistics through System Information Widget in Global View Dashboard.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-22114
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.39004
published_at 2026-04-21T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39087
published_at 2026-04-12T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39067
published_at 2026-04-13T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39092
published_at 2026-04-18T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.391
published_at 2026-04-02T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39122
published_at 2026-04-16T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.3904
published_at 2026-04-07T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39096
published_at 2026-04-08T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39112
published_at 2026-04-09T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.39124
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-22114
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22114
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553
reference_id 1078553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553
4
reference_url https://support.zabbix.com/browse/ZBX-25015
reference_id ZBX-25015
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T12:39:48Z/
url https://support.zabbix.com/browse/ZBX-25015
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5nmy-hdh8-xbg1
1
vulnerability VCID-cdyd-79m9-pyhv
2
vulnerability VCID-dej6-dxbp-a3bt
3
vulnerability VCID-fxqr-51kp-3ber
4
vulnerability VCID-qzp5-px2f-vqc8
5
vulnerability VCID-qzzk-mcfu-sfhv
6
vulnerability VCID-r8yr-aet5-yydn
7
vulnerability VCID-s1mb-1gsj-pbed
8
vulnerability VCID-uh37-bv9z-1bdz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/zabbix@1:7.0.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.0%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2024-22114
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4s92-5es4-yka5
2
url VCID-batr-txtv-s3cf
vulnerability_id VCID-batr-txtv-s3cf
summary Setting SMS media allows to set GSM modem file. Later this file is used as Linux device. But due everything is a file for Linux, it is possible to set another file, e.g. log file and zabbix_server will try to communicate with it as modem. As a result, log file will be broken with AT commands and small part for log file content will be leaked to UI.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-22123
reference_id
reference_type
scores
0
value 0.00402
scoring_system epss
scoring_elements 0.60852
published_at 2026-04-18T12:55:00Z
1
value 0.00402
scoring_system epss
scoring_elements 0.60823
published_at 2026-04-12T12:55:00Z
2
value 0.00402
scoring_system epss
scoring_elements 0.60804
published_at 2026-04-13T12:55:00Z
3
value 0.00402
scoring_system epss
scoring_elements 0.60847
published_at 2026-04-16T12:55:00Z
4
value 0.00402
scoring_system epss
scoring_elements 0.60757
published_at 2026-04-02T12:55:00Z
5
value 0.00402
scoring_system epss
scoring_elements 0.60786
published_at 2026-04-04T12:55:00Z
6
value 0.00402
scoring_system epss
scoring_elements 0.60751
published_at 2026-04-07T12:55:00Z
7
value 0.00402
scoring_system epss
scoring_elements 0.60799
published_at 2026-04-08T12:55:00Z
8
value 0.00402
scoring_system epss
scoring_elements 0.60815
published_at 2026-04-09T12:55:00Z
9
value 0.00402
scoring_system epss
scoring_elements 0.60836
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-22123
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22123
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553
reference_id 1078553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553
4
reference_url https://support.zabbix.com/browse/ZBX-25013
reference_id ZBX-25013
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T14:40:56Z/
url https://support.zabbix.com/browse/ZBX-25013
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5nmy-hdh8-xbg1
1
vulnerability VCID-cdyd-79m9-pyhv
2
vulnerability VCID-dej6-dxbp-a3bt
3
vulnerability VCID-fxqr-51kp-3ber
4
vulnerability VCID-qzp5-px2f-vqc8
5
vulnerability VCID-qzzk-mcfu-sfhv
6
vulnerability VCID-r8yr-aet5-yydn
7
vulnerability VCID-s1mb-1gsj-pbed
8
vulnerability VCID-uh37-bv9z-1bdz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/zabbix@1:7.0.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.0%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2024-22123
risk_score 0.7
exploitability 0.5
weighted_severity 1.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-batr-txtv-s3cf
3
url VCID-wczj-cv1m-7qce
vulnerability_id VCID-wczj-cv1m-7qce
summary An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-22116
reference_id
reference_type
scores
0
value 0.00497
scoring_system epss
scoring_elements 0.65889
published_at 2026-04-21T12:55:00Z
1
value 0.00497
scoring_system epss
scoring_elements 0.65851
published_at 2026-04-13T12:55:00Z
2
value 0.00497
scoring_system epss
scoring_elements 0.65886
published_at 2026-04-16T12:55:00Z
3
value 0.00497
scoring_system epss
scoring_elements 0.65901
published_at 2026-04-18T12:55:00Z
4
value 0.00497
scoring_system epss
scoring_elements 0.65815
published_at 2026-04-02T12:55:00Z
5
value 0.00497
scoring_system epss
scoring_elements 0.65845
published_at 2026-04-04T12:55:00Z
6
value 0.00497
scoring_system epss
scoring_elements 0.65811
published_at 2026-04-07T12:55:00Z
7
value 0.00497
scoring_system epss
scoring_elements 0.65863
published_at 2026-04-08T12:55:00Z
8
value 0.00497
scoring_system epss
scoring_elements 0.65875
published_at 2026-04-09T12:55:00Z
9
value 0.00497
scoring_system epss
scoring_elements 0.65894
published_at 2026-04-11T12:55:00Z
10
value 0.00497
scoring_system epss
scoring_elements 0.65881
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-22116
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22116
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553
reference_id 1078553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553
4
reference_url https://support.zabbix.com/browse/ZBX-25016
reference_id ZBX-25016
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-04T04:55:28Z/
url https://support.zabbix.com/browse/ZBX-25016
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5nmy-hdh8-xbg1
1
vulnerability VCID-cdyd-79m9-pyhv
2
vulnerability VCID-dej6-dxbp-a3bt
3
vulnerability VCID-fxqr-51kp-3ber
4
vulnerability VCID-qzp5-px2f-vqc8
5
vulnerability VCID-qzzk-mcfu-sfhv
6
vulnerability VCID-r8yr-aet5-yydn
7
vulnerability VCID-s1mb-1gsj-pbed
8
vulnerability VCID-uh37-bv9z-1bdz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/zabbix@1:7.0.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.0%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2024-22116
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wczj-cv1m-7qce
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.0%252Bdfsg-1%3Fdistro=trixie