Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1
Typedeb
Namespacedebian
Namezabbix
Version1:5.0.8+dfsg-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1:7.0.9+dfsg-1~bpo12+1
Latest_non_vulnerable_version1:7.0.9+dfsg-1~bpo12+1
Affected_by_vulnerabilities
0
url VCID-172p-q6d5-9ya3
vulnerability_id VCID-172p-q6d5-9ya3
summary Execution time for an unsuccessful login differs when using a non-existing username compared to using an existing one.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-36469
reference_id
reference_type
scores
0
value 0.00125
scoring_system epss
scoring_elements 0.31773
published_at 2026-04-21T12:55:00Z
1
value 0.00125
scoring_system epss
scoring_elements 0.31861
published_at 2026-04-09T12:55:00Z
2
value 0.00125
scoring_system epss
scoring_elements 0.31865
published_at 2026-04-11T12:55:00Z
3
value 0.00125
scoring_system epss
scoring_elements 0.31826
published_at 2026-04-12T12:55:00Z
4
value 0.00125
scoring_system epss
scoring_elements 0.31791
published_at 2026-04-13T12:55:00Z
5
value 0.00125
scoring_system epss
scoring_elements 0.31823
published_at 2026-04-16T12:55:00Z
6
value 0.00125
scoring_system epss
scoring_elements 0.31803
published_at 2026-04-18T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35726
published_at 2026-04-02T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35753
published_at 2026-04-04T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35633
published_at 2026-04-07T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35679
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-36469
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36469
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://support.zabbix.com/browse/ZBX-26255
reference_id ZBX-26255
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:00:32Z/
url https://support.zabbix.com/browse/ZBX-26255
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2024-36469
risk_score 0.8
exploitability 0.5
weighted_severity 1.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-172p-q6d5-9ya3
1
url VCID-18fv-tqjq-p3ce
vulnerability_id VCID-18fv-tqjq-p3ce
summary An authenticated user can create a link with reflected XSS payload for actions’ pages, and send it to other users. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim. This attack can be implemented with the help of social engineering and expiration of a number of factors - an attacker should have authorized access to the Zabbix Frontend and allowed network connection between a malicious server and victim’s computer, understand attacked infrastructure, be recognized by the victim as a trustee and use trusted communication channel.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24349
reference_id
reference_type
scores
0
value 0.00213
scoring_system epss
scoring_elements 0.43854
published_at 2026-04-13T12:55:00Z
1
value 0.00213
scoring_system epss
scoring_elements 0.43878
published_at 2026-04-02T12:55:00Z
2
value 0.00213
scoring_system epss
scoring_elements 0.43902
published_at 2026-04-04T12:55:00Z
3
value 0.00213
scoring_system epss
scoring_elements 0.43832
published_at 2026-04-07T12:55:00Z
4
value 0.00213
scoring_system epss
scoring_elements 0.43883
published_at 2026-04-08T12:55:00Z
5
value 0.00213
scoring_system epss
scoring_elements 0.43886
published_at 2026-04-09T12:55:00Z
6
value 0.00213
scoring_system epss
scoring_elements 0.43904
published_at 2026-04-11T12:55:00Z
7
value 0.00213
scoring_system epss
scoring_elements 0.43871
published_at 2026-04-12T12:55:00Z
8
value 0.00849
scoring_system epss
scoring_elements 0.74902
published_at 2026-04-21T12:55:00Z
9
value 0.00849
scoring_system epss
scoring_elements 0.74904
published_at 2026-04-16T12:55:00Z
10
value 0.00849
scoring_system epss
scoring_elements 0.74911
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24349
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24349
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
aliases CVE-2022-24349
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-18fv-tqjq-p3ce
2
url VCID-1xr6-n296-cyfd
vulnerability_id VCID-1xr6-n296-cyfd
summary The cause of vulnerability is improper validation of form input field “Name” on Graph page in Items section.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-22119
reference_id
reference_type
scores
0
value 0.00423
scoring_system epss
scoring_elements 0.62133
published_at 2026-04-21T12:55:00Z
1
value 0.00423
scoring_system epss
scoring_elements 0.6213
published_at 2026-04-11T12:55:00Z
2
value 0.00423
scoring_system epss
scoring_elements 0.6212
published_at 2026-04-12T12:55:00Z
3
value 0.00423
scoring_system epss
scoring_elements 0.62099
published_at 2026-04-13T12:55:00Z
4
value 0.00423
scoring_system epss
scoring_elements 0.62143
published_at 2026-04-16T12:55:00Z
5
value 0.00423
scoring_system epss
scoring_elements 0.62149
published_at 2026-04-18T12:55:00Z
6
value 0.00423
scoring_system epss
scoring_elements 0.62042
published_at 2026-04-02T12:55:00Z
7
value 0.00423
scoring_system epss
scoring_elements 0.62074
published_at 2026-04-04T12:55:00Z
8
value 0.00423
scoring_system epss
scoring_elements 0.62043
published_at 2026-04-07T12:55:00Z
9
value 0.00423
scoring_system epss
scoring_elements 0.62093
published_at 2026-04-08T12:55:00Z
10
value 0.00423
scoring_system epss
scoring_elements 0.6211
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-22119
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22119
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00020.html
reference_id msg00020.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T14:54:06Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00020.html
4
reference_url https://support.zabbix.com/browse/ZBX-24070
reference_id ZBX-24070
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T14:54:06Z/
url https://support.zabbix.com/browse/ZBX-24070
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2024-22119
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1xr6-n296-cyfd
3
url VCID-2hd4-rbph-5qd8
vulnerability_id VCID-2hd4-rbph-5qd8
summary An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23133
reference_id
reference_type
scores
0
value 0.00963
scoring_system epss
scoring_elements 0.76565
published_at 2026-04-21T12:55:00Z
1
value 0.00963
scoring_system epss
scoring_elements 0.76477
published_at 2026-04-02T12:55:00Z
2
value 0.00963
scoring_system epss
scoring_elements 0.76506
published_at 2026-04-04T12:55:00Z
3
value 0.00963
scoring_system epss
scoring_elements 0.76489
published_at 2026-04-07T12:55:00Z
4
value 0.00963
scoring_system epss
scoring_elements 0.76521
published_at 2026-04-08T12:55:00Z
5
value 0.00963
scoring_system epss
scoring_elements 0.76532
published_at 2026-04-13T12:55:00Z
6
value 0.00963
scoring_system epss
scoring_elements 0.76558
published_at 2026-04-11T12:55:00Z
7
value 0.00963
scoring_system epss
scoring_elements 0.76537
published_at 2026-04-12T12:55:00Z
8
value 0.00963
scoring_system epss
scoring_elements 0.76573
published_at 2026-04-16T12:55:00Z
9
value 0.00963
scoring_system epss
scoring_elements 0.76577
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23133
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23133
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
aliases CVE-2022-23133
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2hd4-rbph-5qd8
4
url VCID-3g1d-2tvh-akh4
vulnerability_id VCID-3g1d-2tvh-akh4
summary Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attacker can send specially crafted requests to the server, which will cause the server to allocate an excessive amount of memory and perform CPU-intensive decompression operations, ultimately leading to a service crash.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45700
reference_id
reference_type
scores
0
value 0.00197
scoring_system epss
scoring_elements 0.41734
published_at 2026-04-21T12:55:00Z
1
value 0.00197
scoring_system epss
scoring_elements 0.41783
published_at 2026-04-13T12:55:00Z
2
value 0.00197
scoring_system epss
scoring_elements 0.41832
published_at 2026-04-16T12:55:00Z
3
value 0.00197
scoring_system epss
scoring_elements 0.41806
published_at 2026-04-18T12:55:00Z
4
value 0.00197
scoring_system epss
scoring_elements 0.41788
published_at 2026-04-02T12:55:00Z
5
value 0.00197
scoring_system epss
scoring_elements 0.41817
published_at 2026-04-04T12:55:00Z
6
value 0.00197
scoring_system epss
scoring_elements 0.41746
published_at 2026-04-07T12:55:00Z
7
value 0.00197
scoring_system epss
scoring_elements 0.41796
published_at 2026-04-12T12:55:00Z
8
value 0.00197
scoring_system epss
scoring_elements 0.41805
published_at 2026-04-09T12:55:00Z
9
value 0.00197
scoring_system epss
scoring_elements 0.41829
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45700
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45700
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://support.zabbix.com/browse/ZBX-26253
reference_id ZBX-26253
reference_type
scores
0
value 6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T16:27:38Z/
url https://support.zabbix.com/browse/ZBX-26253
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2024-45700
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3g1d-2tvh-akh4
5
url VCID-3qru-uxsd-e3c8
vulnerability_id VCID-3qru-uxsd-e3c8
summary Zabbix allows to configure SMS notifications. AT command injection occurs on "Zabbix Server" because there is no validation of "Number" field on Web nor on Zabbix server side. Attacker can run test of SMS providing specially crafted phone number and execute additional AT commands on modem.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-22122
reference_id
reference_type
scores
0
value 0.00438
scoring_system epss
scoring_elements 0.63136
published_at 2026-04-21T12:55:00Z
1
value 0.00438
scoring_system epss
scoring_elements 0.63113
published_at 2026-04-13T12:55:00Z
2
value 0.00438
scoring_system epss
scoring_elements 0.63148
published_at 2026-04-16T12:55:00Z
3
value 0.00438
scoring_system epss
scoring_elements 0.63155
published_at 2026-04-18T12:55:00Z
4
value 0.00438
scoring_system epss
scoring_elements 0.6307
published_at 2026-04-02T12:55:00Z
5
value 0.00438
scoring_system epss
scoring_elements 0.631
published_at 2026-04-04T12:55:00Z
6
value 0.00438
scoring_system epss
scoring_elements 0.63064
published_at 2026-04-07T12:55:00Z
7
value 0.00438
scoring_system epss
scoring_elements 0.63116
published_at 2026-04-08T12:55:00Z
8
value 0.00438
scoring_system epss
scoring_elements 0.63133
published_at 2026-04-09T12:55:00Z
9
value 0.00438
scoring_system epss
scoring_elements 0.6315
published_at 2026-04-11T12:55:00Z
10
value 0.00438
scoring_system epss
scoring_elements 0.63135
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-22122
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22122
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553
reference_id 1078553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553
4
reference_url https://support.zabbix.com/browse/ZBX-25012
reference_id ZBX-25012
reference_type
scores
0
value 3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T14:46:40Z/
url https://support.zabbix.com/browse/ZBX-25012
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2024-22122
risk_score 0.8
exploitability 0.5
weighted_severity 1.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3qru-uxsd-e3c8
6
url VCID-464s-8ex9-kqdz
vulnerability_id VCID-464s-8ex9-kqdz
summary A stored XSS has been found in the Zabbix web application in the Maps element if a URL field is set with spaces before URL.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32721
reference_id
reference_type
scores
0
value 0.00715
scoring_system epss
scoring_elements 0.72306
published_at 2026-04-02T12:55:00Z
1
value 0.00715
scoring_system epss
scoring_elements 0.72324
published_at 2026-04-04T12:55:00Z
2
value 0.00715
scoring_system epss
scoring_elements 0.72301
published_at 2026-04-07T12:55:00Z
3
value 0.00715
scoring_system epss
scoring_elements 0.7234
published_at 2026-04-08T12:55:00Z
4
value 0.00715
scoring_system epss
scoring_elements 0.72352
published_at 2026-04-09T12:55:00Z
5
value 0.00715
scoring_system epss
scoring_elements 0.72375
published_at 2026-04-11T12:55:00Z
6
value 0.00715
scoring_system epss
scoring_elements 0.72358
published_at 2026-04-12T12:55:00Z
7
value 0.00715
scoring_system epss
scoring_elements 0.72346
published_at 2026-04-13T12:55:00Z
8
value 0.00715
scoring_system epss
scoring_elements 0.72387
published_at 2026-04-16T12:55:00Z
9
value 0.00715
scoring_system epss
scoring_elements 0.72397
published_at 2026-04-18T12:55:00Z
10
value 0.00715
scoring_system epss
scoring_elements 0.72384
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32721
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32721
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877
reference_id 1053877
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2023-32721
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-464s-8ex9-kqdz
7
url VCID-4s92-5es4-yka5
vulnerability_id VCID-4s92-5es4-yka5
summary User with no permission to any of the Hosts can access and view host count & other statistics through System Information Widget in Global View Dashboard.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-22114
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.39004
published_at 2026-04-21T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39087
published_at 2026-04-12T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39067
published_at 2026-04-13T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39092
published_at 2026-04-18T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.391
published_at 2026-04-02T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39122
published_at 2026-04-16T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.3904
published_at 2026-04-07T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39096
published_at 2026-04-08T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39112
published_at 2026-04-09T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.39124
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-22114
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22114
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553
reference_id 1078553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553
4
reference_url https://support.zabbix.com/browse/ZBX-25015
reference_id ZBX-25015
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T12:39:48Z/
url https://support.zabbix.com/browse/ZBX-25015
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2024-22114
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4s92-5es4-yka5
8
url VCID-4uxg-fxv7-rua8
vulnerability_id VCID-4uxg-fxv7-rua8
summary An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32727
reference_id
reference_type
scores
0
value 0.00464
scoring_system epss
scoring_elements 0.6436
published_at 2026-04-21T12:55:00Z
1
value 0.00464
scoring_system epss
scoring_elements 0.64302
published_at 2026-04-02T12:55:00Z
2
value 0.00464
scoring_system epss
scoring_elements 0.64322
published_at 2026-04-13T12:55:00Z
3
value 0.00464
scoring_system epss
scoring_elements 0.64358
published_at 2026-04-16T12:55:00Z
4
value 0.00464
scoring_system epss
scoring_elements 0.64369
published_at 2026-04-18T12:55:00Z
5
value 0.00464
scoring_system epss
scoring_elements 0.64331
published_at 2026-04-04T12:55:00Z
6
value 0.00464
scoring_system epss
scoring_elements 0.64287
published_at 2026-04-07T12:55:00Z
7
value 0.00464
scoring_system epss
scoring_elements 0.64335
published_at 2026-04-08T12:55:00Z
8
value 0.00464
scoring_system epss
scoring_elements 0.6435
published_at 2026-04-09T12:55:00Z
9
value 0.00464
scoring_system epss
scoring_elements 0.64363
published_at 2026-04-11T12:55:00Z
10
value 0.00464
scoring_system epss
scoring_elements 0.64351
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32727
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32727
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://support.zabbix.com/browse/ZBX-23857
reference_id ZBX-23857
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:37:31Z/
url https://support.zabbix.com/browse/ZBX-23857
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2023-32727
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4uxg-fxv7-rua8
9
url VCID-547a-p94b-6fep
vulnerability_id VCID-547a-p94b-6fep
summary The zabbix/src/libs/zbxjson module is vulnerable to a buffer overflow when parsing JSON files via zbx_json_open.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32722
reference_id
reference_type
scores
0
value 0.00357
scoring_system epss
scoring_elements 0.58005
published_at 2026-04-21T12:55:00Z
1
value 0.00357
scoring_system epss
scoring_elements 0.57972
published_at 2026-04-02T12:55:00Z
2
value 0.00357
scoring_system epss
scoring_elements 0.57999
published_at 2026-04-13T12:55:00Z
3
value 0.00357
scoring_system epss
scoring_elements 0.58029
published_at 2026-04-16T12:55:00Z
4
value 0.00357
scoring_system epss
scoring_elements 0.58028
published_at 2026-04-18T12:55:00Z
5
value 0.00357
scoring_system epss
scoring_elements 0.5799
published_at 2026-04-04T12:55:00Z
6
value 0.00357
scoring_system epss
scoring_elements 0.57966
published_at 2026-04-07T12:55:00Z
7
value 0.00357
scoring_system epss
scoring_elements 0.58022
published_at 2026-04-08T12:55:00Z
8
value 0.00357
scoring_system epss
scoring_elements 0.58024
published_at 2026-04-09T12:55:00Z
9
value 0.00357
scoring_system epss
scoring_elements 0.58041
published_at 2026-04-11T12:55:00Z
10
value 0.00357
scoring_system epss
scoring_elements 0.58019
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32722
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32722
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877
reference_id 1053877
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877
4
reference_url https://support.zabbix.com/browse/ZBX-23390
reference_id ZBX-23390
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-18T15:26:49Z/
url https://support.zabbix.com/browse/ZBX-23390
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2023-32722
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-547a-p94b-6fep
10
url VCID-5nmy-hdh8-xbg1
vulnerability_id VCID-5nmy-hdh8-xbg1
summary A low privilege Zabbix user with API access can exploit a blind SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL selects via the sortfield parameter. Although query results are not returned directly, an attacker can exfiltrate arbitrary database data through time-based techniques, potentially leading to session identifier disclosure and administrator account compromise.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23921
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09761
published_at 2026-04-21T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09722
published_at 2026-04-02T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.0976
published_at 2026-04-13T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09645
published_at 2026-04-16T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09616
published_at 2026-04-18T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.09772
published_at 2026-04-04T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.09677
published_at 2026-04-07T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09748
published_at 2026-04-08T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09798
published_at 2026-04-09T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.09808
published_at 2026-04-11T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.09777
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23921
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23921
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://support.zabbix.com/browse/ZBX-27640
reference_id ZBX-27640
reference_type
scores
0
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T19:24:25Z/
url https://support.zabbix.com/browse/ZBX-27640
fixed_packages
0
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2026-23921
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5nmy-hdh8-xbg1
11
url VCID-5s7j-6aea-qucr
vulnerability_id VCID-5s7j-6aea-qucr
summary Stored or persistent cross-site scripting (XSS) is a type of XSS where the attacker first sends the payload to the web application, then the application saves the payload (e.g., in a database or server-side text files), and finally, the application unintentionally executes the payload for every victim visiting its web pages.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29454
reference_id
reference_type
scores
0
value 0.00646
scoring_system epss
scoring_elements 0.70673
published_at 2026-04-04T12:55:00Z
1
value 0.00646
scoring_system epss
scoring_elements 0.70654
published_at 2026-04-02T12:55:00Z
2
value 0.00807
scoring_system epss
scoring_elements 0.74209
published_at 2026-04-21T12:55:00Z
3
value 0.00807
scoring_system epss
scoring_elements 0.74177
published_at 2026-04-12T12:55:00Z
4
value 0.00807
scoring_system epss
scoring_elements 0.7417
published_at 2026-04-13T12:55:00Z
5
value 0.00807
scoring_system epss
scoring_elements 0.74208
published_at 2026-04-16T12:55:00Z
6
value 0.00807
scoring_system epss
scoring_elements 0.74217
published_at 2026-04-18T12:55:00Z
7
value 0.00807
scoring_system epss
scoring_elements 0.74126
published_at 2026-04-07T12:55:00Z
8
value 0.00807
scoring_system epss
scoring_elements 0.74159
published_at 2026-04-08T12:55:00Z
9
value 0.00807
scoring_system epss
scoring_elements 0.74174
published_at 2026-04-09T12:55:00Z
10
value 0.00807
scoring_system epss
scoring_elements 0.74195
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29454
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29454
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
reference_id 1055175
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
3
reference_url https://support.zabbix.com/browse/ZBX-22985
reference_id ZBX-22985
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T21:06:47Z/
url https://support.zabbix.com/browse/ZBX-22985
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2023-29454
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5s7j-6aea-qucr
12
url VCID-673b-qsd3-e3hz
vulnerability_id VCID-673b-qsd3-e3hz
summary Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script is activated through a link, which sends a request to a website with a vulnerability that enables execution of malicious scripts.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29455
reference_id
reference_type
scores
0
value 0.00917
scoring_system epss
scoring_elements 0.75899
published_at 2026-04-04T12:55:00Z
1
value 0.00917
scoring_system epss
scoring_elements 0.75866
published_at 2026-04-02T12:55:00Z
2
value 0.01219
scoring_system epss
scoring_elements 0.79081
published_at 2026-04-21T12:55:00Z
3
value 0.01219
scoring_system epss
scoring_elements 0.79068
published_at 2026-04-12T12:55:00Z
4
value 0.01219
scoring_system epss
scoring_elements 0.79058
published_at 2026-04-13T12:55:00Z
5
value 0.01219
scoring_system epss
scoring_elements 0.79085
published_at 2026-04-16T12:55:00Z
6
value 0.01219
scoring_system epss
scoring_elements 0.79082
published_at 2026-04-18T12:55:00Z
7
value 0.01219
scoring_system epss
scoring_elements 0.79028
published_at 2026-04-07T12:55:00Z
8
value 0.01219
scoring_system epss
scoring_elements 0.79052
published_at 2026-04-08T12:55:00Z
9
value 0.01219
scoring_system epss
scoring_elements 0.79059
published_at 2026-04-09T12:55:00Z
10
value 0.01219
scoring_system epss
scoring_elements 0.79083
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29455
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29455
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
reference_id 1055175
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
3
reference_url https://support.zabbix.com/browse/ZBX-22986
reference_id ZBX-22986
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T21:06:45Z/
url https://support.zabbix.com/browse/ZBX-22986
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2023-29455
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-673b-qsd3-e3hz
13
url VCID-69kr-fmzb-nbdr
vulnerability_id VCID-69kr-fmzb-nbdr
summary Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-27234
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25637
published_at 2026-04-07T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25868
published_at 2026-04-04T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.2693
published_at 2026-04-13T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.26983
published_at 2026-04-08T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.27028
published_at 2026-04-09T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.26987
published_at 2026-04-12T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.27031
published_at 2026-04-11T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.2694
published_at 2026-04-16T12:55:00Z
8
value 0.001
scoring_system epss
scoring_elements 0.2776
published_at 2026-04-02T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30678
published_at 2026-04-18T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.30644
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-27234
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27234
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27234
2
reference_url https://support.zabbix.com/browse/ZBX-26985
reference_id ZBX-26985
reference_type
scores
0
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-12T15:16:38Z/
url https://support.zabbix.com/browse/ZBX-26985
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
aliases CVE-2025-27234
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-69kr-fmzb-nbdr
14
url VCID-6u3x-x7qt-g3fa
vulnerability_id VCID-6u3x-x7qt-g3fa
summary JavaScript preprocessing, webhooks and global scripts can cause uncontrolled CPU, memory, and disk I/O utilization. Preprocessing/webhook/global script configuration and testing are only available to Administrative roles (Admin and Superadmin). Administrative privileges should be typically granted to users who need to perform tasks that require more control over the system. The security risk is limited because not all users have this level of access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29449
reference_id
reference_type
scores
0
value 0.00755
scoring_system epss
scoring_elements 0.73212
published_at 2026-04-04T12:55:00Z
1
value 0.00755
scoring_system epss
scoring_elements 0.73191
published_at 2026-04-02T12:55:00Z
2
value 0.0086
scoring_system epss
scoring_elements 0.75049
published_at 2026-04-21T12:55:00Z
3
value 0.0086
scoring_system epss
scoring_elements 0.75015
published_at 2026-04-13T12:55:00Z
4
value 0.0086
scoring_system epss
scoring_elements 0.75051
published_at 2026-04-16T12:55:00Z
5
value 0.0086
scoring_system epss
scoring_elements 0.75059
published_at 2026-04-18T12:55:00Z
6
value 0.0086
scoring_system epss
scoring_elements 0.7498
published_at 2026-04-07T12:55:00Z
7
value 0.0086
scoring_system epss
scoring_elements 0.75014
published_at 2026-04-08T12:55:00Z
8
value 0.0086
scoring_system epss
scoring_elements 0.75026
published_at 2026-04-12T12:55:00Z
9
value 0.0086
scoring_system epss
scoring_elements 0.75047
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29449
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29449
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
reference_id 1055175
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
4
reference_url https://support.zabbix.com/browse/ZBX-22589
reference_id ZBX-22589
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:25:49Z/
url https://support.zabbix.com/browse/ZBX-22589
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2023-29449
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6u3x-x7qt-g3fa
15
url VCID-7bzf-3c9x-8qc4
vulnerability_id VCID-7bzf-3c9x-8qc4
summary An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-36467
reference_id
reference_type
scores
0
value 0.00241
scoring_system epss
scoring_elements 0.47359
published_at 2026-04-12T12:55:00Z
1
value 0.00241
scoring_system epss
scoring_elements 0.47425
published_at 2026-04-16T12:55:00Z
2
value 0.00241
scoring_system epss
scoring_elements 0.47366
published_at 2026-04-13T12:55:00Z
3
value 0.00241
scoring_system epss
scoring_elements 0.47339
published_at 2026-04-02T12:55:00Z
4
value 0.00241
scoring_system epss
scoring_elements 0.4736
published_at 2026-04-09T12:55:00Z
5
value 0.00241
scoring_system epss
scoring_elements 0.47308
published_at 2026-04-07T12:55:00Z
6
value 0.00241
scoring_system epss
scoring_elements 0.47363
published_at 2026-04-08T12:55:00Z
7
value 0.00241
scoring_system epss
scoring_elements 0.47384
published_at 2026-04-11T12:55:00Z
8
value 0.00327
scoring_system epss
scoring_elements 0.55708
published_at 2026-04-21T12:55:00Z
9
value 0.00327
scoring_system epss
scoring_elements 0.55729
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-36467
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36467
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689
reference_id 1088689
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689
4
reference_url https://support.zabbix.com/browse/ZBX-25614
reference_id ZBX-25614
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-04T04:55:25Z/
url https://support.zabbix.com/browse/ZBX-25614
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2024-36467
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7bzf-3c9x-8qc4
16
url VCID-7f3g-hebk-3qad
vulnerability_id VCID-7f3g-hebk-3qad
summary In the src/libs/zbxembed/browser.c file, the es_browser_ctor method retrieves a heap pointer from the Duktape JavaScript engine. This heap pointer is subsequently utilized by the browser_push_error method in the src/libs/zbxembed/browser_error.c file. A use-after-free bug can occur at this stage if the wd->browser heap pointer is freed by garbage collection.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-42331
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13676
published_at 2026-04-21T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13694
published_at 2026-04-13T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13605
published_at 2026-04-16T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13602
published_at 2026-04-18T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13822
published_at 2026-04-02T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13878
published_at 2026-04-04T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13679
published_at 2026-04-07T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13762
published_at 2026-04-08T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13812
published_at 2026-04-09T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13781
published_at 2026-04-11T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13744
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-42331
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42331
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42331
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689
reference_id 1088689
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689
4
reference_url https://support.zabbix.com/browse/ZBX-25627
reference_id ZBX-25627
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:55:25Z/
url https://support.zabbix.com/browse/ZBX-25627
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2024-42331
risk_score 0.8
exploitability 0.5
weighted_severity 1.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7f3g-hebk-3qad
17
url VCID-7yp1-231f-a3eq
vulnerability_id VCID-7yp1-231f-a3eq
summary The implementation of atob in "Zabbix JS" allows to create a string with arbitrary content and use it to access internal properties of objects.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-36463
reference_id
reference_type
scores
0
value 0.00378
scoring_system epss
scoring_elements 0.59354
published_at 2026-04-21T12:55:00Z
1
value 0.00378
scoring_system epss
scoring_elements 0.59334
published_at 2026-04-13T12:55:00Z
2
value 0.00378
scoring_system epss
scoring_elements 0.59367
published_at 2026-04-16T12:55:00Z
3
value 0.00378
scoring_system epss
scoring_elements 0.59373
published_at 2026-04-18T12:55:00Z
4
value 0.00378
scoring_system epss
scoring_elements 0.59297
published_at 2026-04-02T12:55:00Z
5
value 0.00378
scoring_system epss
scoring_elements 0.59321
published_at 2026-04-04T12:55:00Z
6
value 0.00378
scoring_system epss
scoring_elements 0.59286
published_at 2026-04-07T12:55:00Z
7
value 0.00378
scoring_system epss
scoring_elements 0.59336
published_at 2026-04-08T12:55:00Z
8
value 0.00378
scoring_system epss
scoring_elements 0.59349
published_at 2026-04-09T12:55:00Z
9
value 0.00378
scoring_system epss
scoring_elements 0.59368
published_at 2026-04-11T12:55:00Z
10
value 0.00378
scoring_system epss
scoring_elements 0.59352
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-36463
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36463
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36463
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://support.zabbix.com/browse/ZBX-25611
reference_id ZBX-25611
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-26T16:21:34Z/
url https://support.zabbix.com/browse/ZBX-25611
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2024-36463
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7yp1-231f-a3eq
18
url VCID-8cpy-mqfn-y3f9
vulnerability_id VCID-8cpy-mqfn-y3f9
summary An authenticated user can create a link with reflected Javascript code inside it for the graphs page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-35230
reference_id
reference_type
scores
0
value 0.00874
scoring_system epss
scoring_elements 0.75306
published_at 2026-04-21T12:55:00Z
1
value 0.00874
scoring_system epss
scoring_elements 0.75221
published_at 2026-04-02T12:55:00Z
2
value 0.00874
scoring_system epss
scoring_elements 0.75251
published_at 2026-04-04T12:55:00Z
3
value 0.00874
scoring_system epss
scoring_elements 0.75229
published_at 2026-04-07T12:55:00Z
4
value 0.00874
scoring_system epss
scoring_elements 0.75271
published_at 2026-04-08T12:55:00Z
5
value 0.00874
scoring_system epss
scoring_elements 0.75282
published_at 2026-04-09T12:55:00Z
6
value 0.00874
scoring_system epss
scoring_elements 0.75302
published_at 2026-04-11T12:55:00Z
7
value 0.00874
scoring_system epss
scoring_elements 0.7528
published_at 2026-04-12T12:55:00Z
8
value 0.00874
scoring_system epss
scoring_elements 0.75269
published_at 2026-04-13T12:55:00Z
9
value 0.00874
scoring_system epss
scoring_elements 0.75308
published_at 2026-04-16T12:55:00Z
10
value 0.00874
scoring_system epss
scoring_elements 0.75315
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-35230
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35230
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014994
reference_id 1014994
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014994
4
reference_url https://usn.ubuntu.com/6751-1/
reference_id USN-6751-1
reference_type
scores
url https://usn.ubuntu.com/6751-1/
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
aliases CVE-2022-35230
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8cpy-mqfn-y3f9
19
url VCID-9aju-xvg1-n7e5
vulnerability_id VCID-9aju-xvg1-n7e5
summary An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-35229
reference_id
reference_type
scores
0
value 0.00808
scoring_system epss
scoring_elements 0.74234
published_at 2026-04-21T12:55:00Z
1
value 0.00808
scoring_system epss
scoring_elements 0.74152
published_at 2026-04-02T12:55:00Z
2
value 0.00808
scoring_system epss
scoring_elements 0.74179
published_at 2026-04-04T12:55:00Z
3
value 0.00808
scoring_system epss
scoring_elements 0.74151
published_at 2026-04-07T12:55:00Z
4
value 0.00808
scoring_system epss
scoring_elements 0.74184
published_at 2026-04-08T12:55:00Z
5
value 0.00808
scoring_system epss
scoring_elements 0.74199
published_at 2026-04-09T12:55:00Z
6
value 0.00808
scoring_system epss
scoring_elements 0.7422
published_at 2026-04-11T12:55:00Z
7
value 0.00808
scoring_system epss
scoring_elements 0.74203
published_at 2026-04-12T12:55:00Z
8
value 0.00808
scoring_system epss
scoring_elements 0.74196
published_at 2026-04-13T12:55:00Z
9
value 0.00808
scoring_system epss
scoring_elements 0.74233
published_at 2026-04-16T12:55:00Z
10
value 0.00808
scoring_system epss
scoring_elements 0.74243
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-35229
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35229
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014992
reference_id 1014992
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014992
4
reference_url https://usn.ubuntu.com/6751-1/
reference_id USN-6751-1
reference_type
scores
url https://usn.ubuntu.com/6751-1/
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
aliases CVE-2022-35229
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9aju-xvg1-n7e5
20
url VCID-9z8h-gg7t-b7f8
vulnerability_id VCID-9z8h-gg7t-b7f8
summary Memory pointer is in a property of the Ducktape object. This leads to multiple vulnerabilities related to direct memory access and manipulation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32724
reference_id
reference_type
scores
0
value 0.0072
scoring_system epss
scoring_elements 0.72509
published_at 2026-04-21T12:55:00Z
1
value 0.0072
scoring_system epss
scoring_elements 0.72519
published_at 2026-04-18T12:55:00Z
2
value 0.0072
scoring_system epss
scoring_elements 0.72428
published_at 2026-04-02T12:55:00Z
3
value 0.0072
scoring_system epss
scoring_elements 0.72446
published_at 2026-04-04T12:55:00Z
4
value 0.0072
scoring_system epss
scoring_elements 0.72422
published_at 2026-04-07T12:55:00Z
5
value 0.0072
scoring_system epss
scoring_elements 0.72461
published_at 2026-04-08T12:55:00Z
6
value 0.0072
scoring_system epss
scoring_elements 0.72474
published_at 2026-04-09T12:55:00Z
7
value 0.0072
scoring_system epss
scoring_elements 0.72496
published_at 2026-04-11T12:55:00Z
8
value 0.0072
scoring_system epss
scoring_elements 0.72478
published_at 2026-04-12T12:55:00Z
9
value 0.0072
scoring_system epss
scoring_elements 0.72469
published_at 2026-04-13T12:55:00Z
10
value 0.0072
scoring_system epss
scoring_elements 0.7251
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32724
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32724
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877
reference_id 1053877
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877
3
reference_url https://support.zabbix.com/browse/ZBX-23391
reference_id ZBX-23391
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:43:17Z/
url https://support.zabbix.com/browse/ZBX-23391
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2023-32724
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9z8h-gg7t-b7f8
21
url VCID-aetr-jrab-6fg5
vulnerability_id VCID-aetr-jrab-6fg5
summary The HttpRequest object allows to get the HTTP headers from the server's response after sending the request. The problem is that the returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScript. This allows to create internal strings that can be used to access hidden properties of objects.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-42330
reference_id
reference_type
scores
0
value 0.0017
scoring_system epss
scoring_elements 0.38183
published_at 2026-04-12T12:55:00Z
1
value 0.0017
scoring_system epss
scoring_elements 0.38205
published_at 2026-04-16T12:55:00Z
2
value 0.0017
scoring_system epss
scoring_elements 0.38159
published_at 2026-04-13T12:55:00Z
3
value 0.0017
scoring_system epss
scoring_elements 0.38249
published_at 2026-04-02T12:55:00Z
4
value 0.0017
scoring_system epss
scoring_elements 0.38272
published_at 2026-04-04T12:55:00Z
5
value 0.0017
scoring_system epss
scoring_elements 0.38141
published_at 2026-04-07T12:55:00Z
6
value 0.0017
scoring_system epss
scoring_elements 0.38191
published_at 2026-04-08T12:55:00Z
7
value 0.0017
scoring_system epss
scoring_elements 0.38199
published_at 2026-04-09T12:55:00Z
8
value 0.0017
scoring_system epss
scoring_elements 0.38218
published_at 2026-04-11T12:55:00Z
9
value 0.0023
scoring_system epss
scoring_elements 0.45838
published_at 2026-04-21T12:55:00Z
10
value 0.0023
scoring_system epss
scoring_elements 0.45892
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-42330
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42330
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689
reference_id 1088689
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689
4
reference_url https://support.zabbix.com/browse/ZBX-25626
reference_id ZBX-25626
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:12:32Z/
url https://support.zabbix.com/browse/ZBX-25626
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2024-42330
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aetr-jrab-6fg5
22
url VCID-b8tm-2187-wkhz
vulnerability_id VCID-b8tm-2187-wkhz
summary When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be expected to have access to these passwords.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-36464
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15318
published_at 2026-04-12T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15167
published_at 2026-04-16T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15252
published_at 2026-04-13T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15385
published_at 2026-04-02T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15455
published_at 2026-04-04T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15258
published_at 2026-04-07T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15346
published_at 2026-04-08T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15396
published_at 2026-04-09T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15356
published_at 2026-04-11T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20663
published_at 2026-04-21T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20672
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-36464
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36464
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1090030
reference_id 1090030
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1090030
4
reference_url https://support.zabbix.com/browse/ZBX-25630
reference_id ZBX-25630
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:27:15Z/
url https://support.zabbix.com/browse/ZBX-25630
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2024-36464
risk_score 0.7
exploitability 0.5
weighted_severity 1.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b8tm-2187-wkhz
23
url VCID-batr-txtv-s3cf
vulnerability_id VCID-batr-txtv-s3cf
summary Setting SMS media allows to set GSM modem file. Later this file is used as Linux device. But due everything is a file for Linux, it is possible to set another file, e.g. log file and zabbix_server will try to communicate with it as modem. As a result, log file will be broken with AT commands and small part for log file content will be leaked to UI.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-22123
reference_id
reference_type
scores
0
value 0.00402
scoring_system epss
scoring_elements 0.60852
published_at 2026-04-18T12:55:00Z
1
value 0.00402
scoring_system epss
scoring_elements 0.60823
published_at 2026-04-12T12:55:00Z
2
value 0.00402
scoring_system epss
scoring_elements 0.60804
published_at 2026-04-13T12:55:00Z
3
value 0.00402
scoring_system epss
scoring_elements 0.60847
published_at 2026-04-16T12:55:00Z
4
value 0.00402
scoring_system epss
scoring_elements 0.60757
published_at 2026-04-02T12:55:00Z
5
value 0.00402
scoring_system epss
scoring_elements 0.60786
published_at 2026-04-04T12:55:00Z
6
value 0.00402
scoring_system epss
scoring_elements 0.60751
published_at 2026-04-07T12:55:00Z
7
value 0.00402
scoring_system epss
scoring_elements 0.60799
published_at 2026-04-08T12:55:00Z
8
value 0.00402
scoring_system epss
scoring_elements 0.60815
published_at 2026-04-09T12:55:00Z
9
value 0.00402
scoring_system epss
scoring_elements 0.60836
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-22123
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22123
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553
reference_id 1078553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553
4
reference_url https://support.zabbix.com/browse/ZBX-25013
reference_id ZBX-25013
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T14:40:56Z/
url https://support.zabbix.com/browse/ZBX-25013
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2024-22123
risk_score 0.7
exploitability 0.5
weighted_severity 1.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-batr-txtv-s3cf
24
url VCID-cdyd-79m9-pyhv
vulnerability_id VCID-cdyd-79m9-pyhv
summary Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g., "var a = {{.}}"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template. Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29453
reference_id
reference_type
scores
0
value 0.00559
scoring_system epss
scoring_elements 0.68277
published_at 2026-04-21T12:55:00Z
1
value 0.00559
scoring_system epss
scoring_elements 0.68297
published_at 2026-04-18T12:55:00Z
2
value 0.00559
scoring_system epss
scoring_elements 0.68207
published_at 2026-04-02T12:55:00Z
3
value 0.00559
scoring_system epss
scoring_elements 0.68225
published_at 2026-04-04T12:55:00Z
4
value 0.00559
scoring_system epss
scoring_elements 0.68201
published_at 2026-04-07T12:55:00Z
5
value 0.00559
scoring_system epss
scoring_elements 0.68252
published_at 2026-04-08T12:55:00Z
6
value 0.00559
scoring_system epss
scoring_elements 0.68267
published_at 2026-04-09T12:55:00Z
7
value 0.00559
scoring_system epss
scoring_elements 0.68293
published_at 2026-04-11T12:55:00Z
8
value 0.00559
scoring_system epss
scoring_elements 0.6828
published_at 2026-04-12T12:55:00Z
9
value 0.00559
scoring_system epss
scoring_elements 0.68246
published_at 2026-04-13T12:55:00Z
10
value 0.00559
scoring_system epss
scoring_elements 0.68286
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29453
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29453
2
reference_url https://support.zabbix.com/browse/ZBX-23388
reference_id ZBX-23388
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-18T15:17:42Z/
url https://support.zabbix.com/browse/ZBX-23388
fixed_packages
0
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2023-29453
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cdyd-79m9-pyhv
25
url VCID-cuqx-wxkd-nffa
vulnerability_id VCID-cuqx-wxkd-nffa
summary Duktape is an 3rd-party embeddable JavaScript engine, with a focus on portability and compact footprint. When adding too many values in valstack JavaScript will crash. This issue occurs due to bug in Duktape 2.6 which is an 3rd-party solution that we use.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29458
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.28309
published_at 2026-04-04T12:55:00Z
1
value 0.00103
scoring_system epss
scoring_elements 0.28265
published_at 2026-04-02T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32199
published_at 2026-04-21T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32249
published_at 2026-04-16T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32229
published_at 2026-04-18T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32206
published_at 2026-04-07T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.32254
published_at 2026-04-08T12:55:00Z
7
value 0.00128
scoring_system epss
scoring_elements 0.32284
published_at 2026-04-09T12:55:00Z
8
value 0.00128
scoring_system epss
scoring_elements 0.32285
published_at 2026-04-11T12:55:00Z
9
value 0.00128
scoring_system epss
scoring_elements 0.32247
published_at 2026-04-12T12:55:00Z
10
value 0.00128
scoring_system epss
scoring_elements 0.32216
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29458
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29458
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
reference_id 1055175
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
3
reference_url https://support.zabbix.com/browse/ZBX-22989
reference_id ZBX-22989
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:19:37Z/
url https://support.zabbix.com/browse/ZBX-22989
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2023-29458
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cuqx-wxkd-nffa
26
url VCID-d7uk-h423-77f5
vulnerability_id VCID-d7uk-h423-77f5
summary The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32726
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.32939
published_at 2026-04-21T12:55:00Z
1
value 0.00134
scoring_system epss
scoring_elements 0.33077
published_at 2026-04-02T12:55:00Z
2
value 0.00134
scoring_system epss
scoring_elements 0.33109
published_at 2026-04-04T12:55:00Z
3
value 0.00134
scoring_system epss
scoring_elements 0.3294
published_at 2026-04-07T12:55:00Z
4
value 0.00134
scoring_system epss
scoring_elements 0.32985
published_at 2026-04-08T12:55:00Z
5
value 0.00134
scoring_system epss
scoring_elements 0.33016
published_at 2026-04-09T12:55:00Z
6
value 0.00134
scoring_system epss
scoring_elements 0.33019
published_at 2026-04-11T12:55:00Z
7
value 0.00134
scoring_system epss
scoring_elements 0.32981
published_at 2026-04-12T12:55:00Z
8
value 0.00134
scoring_system epss
scoring_elements 0.32956
published_at 2026-04-13T12:55:00Z
9
value 0.00134
scoring_system epss
scoring_elements 0.32998
published_at 2026-04-16T12:55:00Z
10
value 0.00134
scoring_system epss
scoring_elements 0.32976
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32726
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32726
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32726
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2023-32726
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d7uk-h423-77f5
27
url VCID-dej6-dxbp-a3bt
vulnerability_id VCID-dej6-dxbp-a3bt
summary A regular Zabbix user with no permission to the Monitoring -> Problems view is still able to call the problem.view.refresh action and therefore still retrieve a list of active problems.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49641
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16702
published_at 2026-04-21T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16864
published_at 2026-04-02T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16721
published_at 2026-04-13T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16657
published_at 2026-04-16T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16664
published_at 2026-04-18T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16922
published_at 2026-04-04T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16705
published_at 2026-04-07T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16791
published_at 2026-04-08T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16845
published_at 2026-04-09T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16823
published_at 2026-04-11T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.1678
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49641
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49641
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117448
reference_id 1117448
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117448
4
reference_url https://support.zabbix.com/browse/ZBX-27063
reference_id ZBX-27063
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-03T13:51:55Z/
url https://support.zabbix.com/browse/ZBX-27063
fixed_packages
0
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2025-49641
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dej6-dxbp-a3bt
28
url VCID-ftt2-5jnt-9ye2
vulnerability_id VCID-ftt2-5jnt-9ye2
summary Reflected XSS attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script can be activated through Action form fields, which can be sent as request to a website with a vulnerability that enables execution of malicious scripts.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29457
reference_id
reference_type
scores
0
value 0.00367
scoring_system epss
scoring_elements 0.58661
published_at 2026-04-04T12:55:00Z
1
value 0.00367
scoring_system epss
scoring_elements 0.5864
published_at 2026-04-02T12:55:00Z
2
value 0.0049
scoring_system epss
scoring_elements 0.65591
published_at 2026-04-21T12:55:00Z
3
value 0.0049
scoring_system epss
scoring_elements 0.656
published_at 2026-04-11T12:55:00Z
4
value 0.0049
scoring_system epss
scoring_elements 0.65586
published_at 2026-04-12T12:55:00Z
5
value 0.0049
scoring_system epss
scoring_elements 0.65558
published_at 2026-04-13T12:55:00Z
6
value 0.0049
scoring_system epss
scoring_elements 0.65594
published_at 2026-04-16T12:55:00Z
7
value 0.0049
scoring_system epss
scoring_elements 0.65607
published_at 2026-04-18T12:55:00Z
8
value 0.0049
scoring_system epss
scoring_elements 0.65516
published_at 2026-04-07T12:55:00Z
9
value 0.0049
scoring_system epss
scoring_elements 0.65569
published_at 2026-04-08T12:55:00Z
10
value 0.0049
scoring_system epss
scoring_elements 0.65581
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29457
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29457
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29457
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
reference_id 1055175
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
4
reference_url https://support.zabbix.com/browse/ZBX-22988
reference_id ZBX-22988
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T21:06:43Z/
url https://support.zabbix.com/browse/ZBX-22988
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2023-29457
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ftt2-5jnt-9ye2
29
url VCID-fxqr-51kp-3ber
vulnerability_id VCID-fxqr-51kp-3ber
summary For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script items, JavaScript reprocessing, Webhooks). This can lead to confidentiality loss where a regular (non-super) Zabbix administrator leaks data for hosts they do not have access to. A fix has been released that makes the built in Zabbix JavaScript objects read-only, but please be advised that usage of global JavaScript variables is not recommended because their content could be leaked. More information <a href='https://www.zabbix.com/documentation/7.4/en/manual/installation/known_issues#preprocessing-global-variables-are-unsafe'>in Zabbix documentation</a>.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23919
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05655
published_at 2026-04-11T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05583
published_at 2026-04-02T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.0564
published_at 2026-04-13T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05647
published_at 2026-04-12T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05621
published_at 2026-04-04T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05618
published_at 2026-04-07T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05656
published_at 2026-04-08T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05683
published_at 2026-04-09T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06722
published_at 2026-04-21T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06572
published_at 2026-04-16T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06564
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23919
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23919
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://support.zabbix.com/browse/ZBX-27638
reference_id ZBX-27638
reference_type
scores
0
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-24T18:36:08Z/
url https://support.zabbix.com/browse/ZBX-27638
fixed_packages
0
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2026-23919
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fxqr-51kp-3ber
30
url VCID-gbn9-b2t2-5fbs
vulnerability_id VCID-gbn9-b2t2-5fbs
summary During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23132
reference_id
reference_type
scores
0
value 0.00141
scoring_system epss
scoring_elements 0.34335
published_at 2026-04-21T12:55:00Z
1
value 0.00141
scoring_system epss
scoring_elements 0.34448
published_at 2026-04-02T12:55:00Z
2
value 0.00141
scoring_system epss
scoring_elements 0.34477
published_at 2026-04-04T12:55:00Z
3
value 0.00141
scoring_system epss
scoring_elements 0.34343
published_at 2026-04-07T12:55:00Z
4
value 0.00141
scoring_system epss
scoring_elements 0.34386
published_at 2026-04-08T12:55:00Z
5
value 0.00141
scoring_system epss
scoring_elements 0.34415
published_at 2026-04-09T12:55:00Z
6
value 0.00141
scoring_system epss
scoring_elements 0.34418
published_at 2026-04-11T12:55:00Z
7
value 0.00141
scoring_system epss
scoring_elements 0.34379
published_at 2026-04-12T12:55:00Z
8
value 0.00141
scoring_system epss
scoring_elements 0.34355
published_at 2026-04-13T12:55:00Z
9
value 0.00141
scoring_system epss
scoring_elements 0.34389
published_at 2026-04-16T12:55:00Z
10
value 0.00141
scoring_system epss
scoring_elements 0.34375
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23132
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23132
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
aliases CVE-2022-23132
risk_score 0.8
exploitability 0.5
weighted_severity 1.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gbn9-b2t2-5fbs
31
url VCID-gp3f-yz9h-eqax
vulnerability_id VCID-gp3f-yz9h-eqax
summary The front-end audit log allows viewing of unprotected plaintext passwords, where the passwords are displayed in plain text.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-36460
reference_id
reference_type
scores
0
value 0.00446
scoring_system epss
scoring_elements 0.6348
published_at 2026-04-21T12:55:00Z
1
value 0.00446
scoring_system epss
scoring_elements 0.63488
published_at 2026-04-12T12:55:00Z
2
value 0.00446
scoring_system epss
scoring_elements 0.63454
published_at 2026-04-13T12:55:00Z
3
value 0.00446
scoring_system epss
scoring_elements 0.63495
published_at 2026-04-18T12:55:00Z
4
value 0.00446
scoring_system epss
scoring_elements 0.63426
published_at 2026-04-02T12:55:00Z
5
value 0.00446
scoring_system epss
scoring_elements 0.63453
published_at 2026-04-04T12:55:00Z
6
value 0.00446
scoring_system epss
scoring_elements 0.63418
published_at 2026-04-07T12:55:00Z
7
value 0.00446
scoring_system epss
scoring_elements 0.6347
published_at 2026-04-08T12:55:00Z
8
value 0.00446
scoring_system epss
scoring_elements 0.63487
published_at 2026-04-16T12:55:00Z
9
value 0.00446
scoring_system epss
scoring_elements 0.63504
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-36460
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36460
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553
reference_id 1078553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553
4
reference_url https://support.zabbix.com/browse/ZBX-25017
reference_id ZBX-25017
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:04:09Z/
url https://support.zabbix.com/browse/ZBX-25017
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2024-36460
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gp3f-yz9h-eqax
32
url VCID-kx3g-p2zj-duaj
vulnerability_id VCID-kx3g-p2zj-duaj
summary URL validation scheme receives input from a user and then parses it to identify its various components. The validation scheme can ensure that all URL components comply with internet standards.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29456
reference_id
reference_type
scores
0
value 0.00122
scoring_system epss
scoring_elements 0.31519
published_at 2026-04-04T12:55:00Z
1
value 0.00122
scoring_system epss
scoring_elements 0.31478
published_at 2026-04-02T12:55:00Z
2
value 0.00153
scoring_system epss
scoring_elements 0.35989
published_at 2026-04-21T12:55:00Z
3
value 0.00153
scoring_system epss
scoring_elements 0.36042
published_at 2026-04-12T12:55:00Z
4
value 0.00153
scoring_system epss
scoring_elements 0.36016
published_at 2026-04-13T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.36055
published_at 2026-04-16T12:55:00Z
6
value 0.00153
scoring_system epss
scoring_elements 0.36041
published_at 2026-04-18T12:55:00Z
7
value 0.00153
scoring_system epss
scoring_elements 0.36006
published_at 2026-04-07T12:55:00Z
8
value 0.00153
scoring_system epss
scoring_elements 0.36056
published_at 2026-04-08T12:55:00Z
9
value 0.00153
scoring_system epss
scoring_elements 0.36074
published_at 2026-04-09T12:55:00Z
10
value 0.00153
scoring_system epss
scoring_elements 0.36081
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29456
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29456
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
reference_id 1055175
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
3
reference_url https://support.zabbix.com/browse/ZBX-22987
reference_id ZBX-22987
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:19:48Z/
url https://support.zabbix.com/browse/ZBX-22987
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2023-29456
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kx3g-p2zj-duaj
33
url VCID-mggj-rvdd-eqc6
vulnerability_id VCID-mggj-rvdd-eqc6
summary An authenticated user can create a link with reflected Javascript code inside it for services’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24917
reference_id
reference_type
scores
0
value 0.00301
scoring_system epss
scoring_elements 0.53445
published_at 2026-04-13T12:55:00Z
1
value 0.00301
scoring_system epss
scoring_elements 0.53387
published_at 2026-04-02T12:55:00Z
2
value 0.00301
scoring_system epss
scoring_elements 0.53413
published_at 2026-04-04T12:55:00Z
3
value 0.00301
scoring_system epss
scoring_elements 0.53382
published_at 2026-04-07T12:55:00Z
4
value 0.00301
scoring_system epss
scoring_elements 0.53434
published_at 2026-04-08T12:55:00Z
5
value 0.00301
scoring_system epss
scoring_elements 0.53429
published_at 2026-04-09T12:55:00Z
6
value 0.00301
scoring_system epss
scoring_elements 0.53478
published_at 2026-04-11T12:55:00Z
7
value 0.00301
scoring_system epss
scoring_elements 0.53462
published_at 2026-04-12T12:55:00Z
8
value 0.00882
scoring_system epss
scoring_elements 0.75433
published_at 2026-04-21T12:55:00Z
9
value 0.00882
scoring_system epss
scoring_elements 0.75438
published_at 2026-04-16T12:55:00Z
10
value 0.00882
scoring_system epss
scoring_elements 0.75444
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24917
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24917
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
aliases CVE-2022-24917
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mggj-rvdd-eqc6
34
url VCID-mhx5-hcg2-wfc4
vulnerability_id VCID-mhx5-hcg2-wfc4
summary The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaScript payload may be injected into the above endpoint causing it to be executed within the context of the victim's browser.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45699
reference_id
reference_type
scores
0
value 0.00211
scoring_system epss
scoring_elements 0.43566
published_at 2026-04-21T12:55:00Z
1
value 0.00211
scoring_system epss
scoring_elements 0.43581
published_at 2026-04-13T12:55:00Z
2
value 0.00211
scoring_system epss
scoring_elements 0.43642
published_at 2026-04-16T12:55:00Z
3
value 0.00211
scoring_system epss
scoring_elements 0.43631
published_at 2026-04-18T12:55:00Z
4
value 0.00211
scoring_system epss
scoring_elements 0.43591
published_at 2026-04-02T12:55:00Z
5
value 0.00211
scoring_system epss
scoring_elements 0.43618
published_at 2026-04-04T12:55:00Z
6
value 0.00211
scoring_system epss
scoring_elements 0.43554
published_at 2026-04-07T12:55:00Z
7
value 0.00211
scoring_system epss
scoring_elements 0.43605
published_at 2026-04-08T12:55:00Z
8
value 0.00211
scoring_system epss
scoring_elements 0.4361
published_at 2026-04-09T12:55:00Z
9
value 0.00211
scoring_system epss
scoring_elements 0.43629
published_at 2026-04-11T12:55:00Z
10
value 0.00211
scoring_system epss
scoring_elements 0.43597
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45699
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45699
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://support.zabbix.com/browse/ZBX-26254
reference_id ZBX-26254
reference_type
scores
0
value 7.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T16:28:20Z/
url https://support.zabbix.com/browse/ZBX-26254
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2024-45699
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mhx5-hcg2-wfc4
35
url VCID-nrkb-pzcu-8ueg
vulnerability_id VCID-nrkb-pzcu-8ueg
summary Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-36461
reference_id
reference_type
scores
0
value 0.00725
scoring_system epss
scoring_elements 0.7262
published_at 2026-04-21T12:55:00Z
1
value 0.00725
scoring_system epss
scoring_elements 0.72576
published_at 2026-04-13T12:55:00Z
2
value 0.00725
scoring_system epss
scoring_elements 0.72618
published_at 2026-04-16T12:55:00Z
3
value 0.00725
scoring_system epss
scoring_elements 0.72629
published_at 2026-04-18T12:55:00Z
4
value 0.00725
scoring_system epss
scoring_elements 0.72536
published_at 2026-04-02T12:55:00Z
5
value 0.00725
scoring_system epss
scoring_elements 0.72553
published_at 2026-04-04T12:55:00Z
6
value 0.00725
scoring_system epss
scoring_elements 0.7253
published_at 2026-04-07T12:55:00Z
7
value 0.00725
scoring_system epss
scoring_elements 0.72568
published_at 2026-04-08T12:55:00Z
8
value 0.00725
scoring_system epss
scoring_elements 0.7258
published_at 2026-04-09T12:55:00Z
9
value 0.00725
scoring_system epss
scoring_elements 0.72604
published_at 2026-04-11T12:55:00Z
10
value 0.00725
scoring_system epss
scoring_elements 0.72587
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-36461
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36461
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553
reference_id 1078553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553
4
reference_url https://support.zabbix.com/browse/ZBX-25018
reference_id ZBX-25018
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T15:21:52Z/
url https://support.zabbix.com/browse/ZBX-25018
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2024-36461
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nrkb-pzcu-8ueg
36
url VCID-psak-h1x6-1kca
vulnerability_id VCID-psak-h1x6-1kca
summary Zabbix API user.get returns all users that share common group with the calling user. This includes media and other information, such as login attempts, etc.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-42325
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.28198
published_at 2026-04-21T12:55:00Z
1
value 0.00103
scoring_system epss
scoring_elements 0.28348
published_at 2026-04-09T12:55:00Z
2
value 0.00103
scoring_system epss
scoring_elements 0.28352
published_at 2026-04-11T12:55:00Z
3
value 0.00103
scoring_system epss
scoring_elements 0.28309
published_at 2026-04-12T12:55:00Z
4
value 0.00103
scoring_system epss
scoring_elements 0.28251
published_at 2026-04-13T12:55:00Z
5
value 0.00103
scoring_system epss
scoring_elements 0.28263
published_at 2026-04-16T12:55:00Z
6
value 0.00103
scoring_system epss
scoring_elements 0.28245
published_at 2026-04-18T12:55:00Z
7
value 0.00124
scoring_system epss
scoring_elements 0.31731
published_at 2026-04-02T12:55:00Z
8
value 0.00124
scoring_system epss
scoring_elements 0.31776
published_at 2026-04-04T12:55:00Z
9
value 0.00124
scoring_system epss
scoring_elements 0.31594
published_at 2026-04-07T12:55:00Z
10
value 0.00124
scoring_system epss
scoring_elements 0.31647
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-42325
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42325
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://support.zabbix.com/browse/ZBX-26258
reference_id ZBX-26258
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:48:54Z/
url https://support.zabbix.com/browse/ZBX-26258
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2024-42325
risk_score 0.9
exploitability 0.5
weighted_severity 1.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-psak-h1x6-1kca
37
url VCID-qhxc-w75p-kqaj
vulnerability_id VCID-qhxc-w75p-kqaj
summary An authenticated user can create a link with reflected Javascript code inside it for graphs’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24919
reference_id
reference_type
scores
0
value 0.00301
scoring_system epss
scoring_elements 0.53445
published_at 2026-04-13T12:55:00Z
1
value 0.00301
scoring_system epss
scoring_elements 0.53387
published_at 2026-04-02T12:55:00Z
2
value 0.00301
scoring_system epss
scoring_elements 0.53413
published_at 2026-04-04T12:55:00Z
3
value 0.00301
scoring_system epss
scoring_elements 0.53382
published_at 2026-04-07T12:55:00Z
4
value 0.00301
scoring_system epss
scoring_elements 0.53434
published_at 2026-04-08T12:55:00Z
5
value 0.00301
scoring_system epss
scoring_elements 0.53429
published_at 2026-04-09T12:55:00Z
6
value 0.00301
scoring_system epss
scoring_elements 0.53478
published_at 2026-04-11T12:55:00Z
7
value 0.00301
scoring_system epss
scoring_elements 0.53462
published_at 2026-04-12T12:55:00Z
8
value 0.00882
scoring_system epss
scoring_elements 0.75433
published_at 2026-04-21T12:55:00Z
9
value 0.00882
scoring_system epss
scoring_elements 0.75438
published_at 2026-04-16T12:55:00Z
10
value 0.00882
scoring_system epss
scoring_elements 0.75444
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24919
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24919
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
aliases CVE-2022-24919
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qhxc-w75p-kqaj
38
url VCID-qzp5-px2f-vqc8
vulnerability_id VCID-qzp5-px2f-vqc8
summary A regular Zabbix user can search other users in their user group via Zabbix API by select fields the user does not have access to view. This allows data-mining some field values the user does not have access to.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-27236
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14616
published_at 2026-04-21T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14756
published_at 2026-04-02T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14654
published_at 2026-04-13T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14546
published_at 2026-04-16T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14552
published_at 2026-04-18T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14832
published_at 2026-04-04T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14636
published_at 2026-04-07T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14726
published_at 2026-04-08T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14785
published_at 2026-04-09T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14745
published_at 2026-04-11T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14708
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-27236
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27236
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27236
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117448
reference_id 1117448
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117448
4
reference_url https://support.zabbix.com/browse/ZBX-27060
reference_id ZBX-27060
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-03T13:52:30Z/
url https://support.zabbix.com/browse/ZBX-27060
fixed_packages
0
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2025-27236
risk_score 0.9
exploitability 0.5
weighted_severity 1.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qzp5-px2f-vqc8
39
url VCID-qzzk-mcfu-sfhv
vulnerability_id VCID-qzzk-mcfu-sfhv
summary zabbix: Zabbix: Confidentiality loss via improper access control in configuration.import API
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23925.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23925
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01567
published_at 2026-04-04T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01563
published_at 2026-04-02T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02403
published_at 2026-04-21T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02317
published_at 2026-04-13T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02301
published_at 2026-04-16T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02307
published_at 2026-04-18T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02331
published_at 2026-04-07T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02334
published_at 2026-04-08T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02356
published_at 2026-04-09T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02333
published_at 2026-04-11T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02319
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23925
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23925
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2445155
reference_id 2445155
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2445155
5
reference_url https://support.zabbix.com/browse/ZBX-27567
reference_id ZBX-27567
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:H/SI:N/SA:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-09T20:54:37Z/
url https://support.zabbix.com/browse/ZBX-27567
fixed_packages
0
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2026-23925
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qzzk-mcfu-sfhv
40
url VCID-r65p-6wkq-sfb9
vulnerability_id VCID-r65p-6wkq-sfb9
summary JavaScript pre-processing can be used by the attacker to gain access to the file system (read-only access on behalf of user "zabbix") on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29450
reference_id
reference_type
scores
0
value 0.00254
scoring_system epss
scoring_elements 0.48684
published_at 2026-04-04T12:55:00Z
1
value 0.00254
scoring_system epss
scoring_elements 0.48662
published_at 2026-04-02T12:55:00Z
2
value 0.00289
scoring_system epss
scoring_elements 0.52434
published_at 2026-04-18T12:55:00Z
3
value 0.00289
scoring_system epss
scoring_elements 0.52369
published_at 2026-04-09T12:55:00Z
4
value 0.00289
scoring_system epss
scoring_elements 0.52419
published_at 2026-04-21T12:55:00Z
5
value 0.00289
scoring_system epss
scoring_elements 0.52403
published_at 2026-04-12T12:55:00Z
6
value 0.00289
scoring_system epss
scoring_elements 0.52389
published_at 2026-04-13T12:55:00Z
7
value 0.00289
scoring_system epss
scoring_elements 0.52428
published_at 2026-04-16T12:55:00Z
8
value 0.00289
scoring_system epss
scoring_elements 0.52321
published_at 2026-04-07T12:55:00Z
9
value 0.00289
scoring_system epss
scoring_elements 0.52374
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29450
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29450
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
reference_id 1055175
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175
4
reference_url https://support.zabbix.com/browse/ZBX-22588
reference_id ZBX-22588
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T14:20:54Z/
url https://support.zabbix.com/browse/ZBX-22588
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2023-29450
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r65p-6wkq-sfb9
41
url VCID-r8yr-aet5-yydn
vulnerability_id VCID-r8yr-aet5-yydn
summary Host and event action script input is validated with a regex (set by the administrator), but the validation runs in multiline mode. If ^ and $ anchors are used in user input validation, an injected newline lets authenticated users bypass the check and inject shell commands.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23920
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.1634
published_at 2026-04-21T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16462
published_at 2026-04-02T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16349
published_at 2026-04-13T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16285
published_at 2026-04-16T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16305
published_at 2026-04-18T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16524
published_at 2026-04-04T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.1632
published_at 2026-04-07T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16406
published_at 2026-04-08T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16465
published_at 2026-04-09T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16449
published_at 2026-04-11T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.1641
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23920
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23920
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://support.zabbix.com/browse/ZBX-27639
reference_id ZBX-27639
reference_type
scores
0
value 7.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T19:24:03Z/
url https://support.zabbix.com/browse/ZBX-27639
fixed_packages
0
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2026-23920
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r8yr-aet5-yydn
42
url VCID-s1mb-1gsj-pbed
vulnerability_id VCID-s1mb-1gsj-pbed
summary An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49643
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.3279
published_at 2026-04-21T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.32825
published_at 2026-04-18T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32936
published_at 2026-04-02T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32971
published_at 2026-04-04T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32793
published_at 2026-04-07T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.3284
published_at 2026-04-08T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.3287
published_at 2026-04-09T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32871
published_at 2026-04-11T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32832
published_at 2026-04-12T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32806
published_at 2026-04-13T12:55:00Z
10
value 0.00133
scoring_system epss
scoring_elements 0.32848
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49643
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49643
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121841
reference_id 1121841
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121841
3
reference_url https://support.zabbix.com/browse/ZBX-27284
reference_id ZBX-27284
reference_type
scores
0
value 6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-01T14:33:57Z/
url https://support.zabbix.com/browse/ZBX-27284
fixed_packages
0
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2025-49643
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s1mb-1gsj-pbed
43
url VCID-uh37-bv9z-1bdz
vulnerability_id VCID-uh37-bv9z-1bdz
summary The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-27231
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13398
published_at 2026-04-21T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13532
published_at 2026-04-02T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13458
published_at 2026-04-12T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13411
published_at 2026-04-13T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13318
published_at 2026-04-18T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13594
published_at 2026-04-04T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13391
published_at 2026-04-07T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13472
published_at 2026-04-08T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13521
published_at 2026-04-09T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13494
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-27231
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27231
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117448
reference_id 1117448
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117448
4
reference_url https://support.zabbix.com/browse/ZBX-27062
reference_id ZBX-27062
reference_type
scores
0
value 4.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-03T13:55:44Z/
url https://support.zabbix.com/browse/ZBX-27062
fixed_packages
0
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2025-27231
risk_score 1.1
exploitability 0.5
weighted_severity 2.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uh37-bv9z-1bdz
44
url VCID-uu3f-3rbn-9fad
vulnerability_id VCID-uu3f-3rbn-9fad
summary An authenticated user can create a link with reflected Javascript code inside it for items’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24918
reference_id
reference_type
scores
0
value 0.0097
scoring_system epss
scoring_elements 0.76651
published_at 2026-04-21T12:55:00Z
1
value 0.0097
scoring_system epss
scoring_elements 0.76569
published_at 2026-04-02T12:55:00Z
2
value 0.0097
scoring_system epss
scoring_elements 0.76598
published_at 2026-04-04T12:55:00Z
3
value 0.0097
scoring_system epss
scoring_elements 0.76578
published_at 2026-04-07T12:55:00Z
4
value 0.0097
scoring_system epss
scoring_elements 0.7661
published_at 2026-04-08T12:55:00Z
5
value 0.0097
scoring_system epss
scoring_elements 0.76621
published_at 2026-04-09T12:55:00Z
6
value 0.0097
scoring_system epss
scoring_elements 0.76647
published_at 2026-04-11T12:55:00Z
7
value 0.0097
scoring_system epss
scoring_elements 0.76627
published_at 2026-04-12T12:55:00Z
8
value 0.0097
scoring_system epss
scoring_elements 0.76617
published_at 2026-04-13T12:55:00Z
9
value 0.0097
scoring_system epss
scoring_elements 0.76659
published_at 2026-04-16T12:55:00Z
10
value 0.0097
scoring_system epss
scoring_elements 0.76663
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24918
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24918
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
aliases CVE-2022-24918
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uu3f-3rbn-9fad
45
url VCID-uxdf-6tyd-rucd
vulnerability_id VCID-uxdf-6tyd-rucd
summary The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-42332
reference_id
reference_type
scores
0
value 0.00425
scoring_system epss
scoring_elements 0.62249
published_at 2026-04-21T12:55:00Z
1
value 0.00425
scoring_system epss
scoring_elements 0.62212
published_at 2026-04-13T12:55:00Z
2
value 0.00425
scoring_system epss
scoring_elements 0.62258
published_at 2026-04-16T12:55:00Z
3
value 0.00425
scoring_system epss
scoring_elements 0.62265
published_at 2026-04-18T12:55:00Z
4
value 0.00425
scoring_system epss
scoring_elements 0.6216
published_at 2026-04-02T12:55:00Z
5
value 0.00425
scoring_system epss
scoring_elements 0.62191
published_at 2026-04-04T12:55:00Z
6
value 0.00425
scoring_system epss
scoring_elements 0.62158
published_at 2026-04-07T12:55:00Z
7
value 0.00425
scoring_system epss
scoring_elements 0.62208
published_at 2026-04-08T12:55:00Z
8
value 0.00425
scoring_system epss
scoring_elements 0.62226
published_at 2026-04-09T12:55:00Z
9
value 0.00425
scoring_system epss
scoring_elements 0.62244
published_at 2026-04-11T12:55:00Z
10
value 0.00425
scoring_system epss
scoring_elements 0.62234
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-42332
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42332
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689
reference_id 1088689
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689
4
reference_url https://support.zabbix.com/browse/ZBX-25628
reference_id ZBX-25628
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:54:59Z/
url https://support.zabbix.com/browse/ZBX-25628
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2024-42332
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uxdf-6tyd-rucd
46
url VCID-wczj-cv1m-7qce
vulnerability_id VCID-wczj-cv1m-7qce
summary An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-22116
reference_id
reference_type
scores
0
value 0.00497
scoring_system epss
scoring_elements 0.65889
published_at 2026-04-21T12:55:00Z
1
value 0.00497
scoring_system epss
scoring_elements 0.65851
published_at 2026-04-13T12:55:00Z
2
value 0.00497
scoring_system epss
scoring_elements 0.65886
published_at 2026-04-16T12:55:00Z
3
value 0.00497
scoring_system epss
scoring_elements 0.65901
published_at 2026-04-18T12:55:00Z
4
value 0.00497
scoring_system epss
scoring_elements 0.65815
published_at 2026-04-02T12:55:00Z
5
value 0.00497
scoring_system epss
scoring_elements 0.65845
published_at 2026-04-04T12:55:00Z
6
value 0.00497
scoring_system epss
scoring_elements 0.65811
published_at 2026-04-07T12:55:00Z
7
value 0.00497
scoring_system epss
scoring_elements 0.65863
published_at 2026-04-08T12:55:00Z
8
value 0.00497
scoring_system epss
scoring_elements 0.65875
published_at 2026-04-09T12:55:00Z
9
value 0.00497
scoring_system epss
scoring_elements 0.65894
published_at 2026-04-11T12:55:00Z
10
value 0.00497
scoring_system epss
scoring_elements 0.65881
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-22116
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22116
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553
reference_id 1078553
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553
4
reference_url https://support.zabbix.com/browse/ZBX-25016
reference_id ZBX-25016
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-04T04:55:28Z/
url https://support.zabbix.com/browse/ZBX-25016
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2024-22116
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wczj-cv1m-7qce
47
url VCID-wfae-uyd7-ybc3
vulnerability_id VCID-wfae-uyd7-ybc3
summary Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix Frontend while it is being maintained and possible sensitive data will be prevented from being disclosed. An attacker can bypass this protection and access the instance using IP address not listed in the defined range.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43515
reference_id
reference_type
scores
0
value 0.00125
scoring_system epss
scoring_elements 0.31727
published_at 2026-04-08T12:55:00Z
1
value 0.00125
scoring_system epss
scoring_elements 0.31813
published_at 2026-04-02T12:55:00Z
2
value 0.00125
scoring_system epss
scoring_elements 0.31684
published_at 2026-04-13T12:55:00Z
3
value 0.00125
scoring_system epss
scoring_elements 0.3172
published_at 2026-04-12T12:55:00Z
4
value 0.00125
scoring_system epss
scoring_elements 0.3176
published_at 2026-04-11T12:55:00Z
5
value 0.00125
scoring_system epss
scoring_elements 0.31757
published_at 2026-04-09T12:55:00Z
6
value 0.00125
scoring_system epss
scoring_elements 0.31857
published_at 2026-04-04T12:55:00Z
7
value 0.00125
scoring_system epss
scoring_elements 0.31676
published_at 2026-04-07T12:55:00Z
8
value 0.00181
scoring_system epss
scoring_elements 0.39644
published_at 2026-04-21T12:55:00Z
9
value 0.00181
scoring_system epss
scoring_elements 0.39757
published_at 2026-04-16T12:55:00Z
10
value 0.00181
scoring_system epss
scoring_elements 0.39728
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43515
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43515
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026847
reference_id 1026847
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026847
4
reference_url https://support.zabbix.com/browse/ZBX-22050
reference_id ZBX-22050
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T17:57:56Z/
url https://support.zabbix.com/browse/ZBX-22050
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
aliases CVE-2022-43515
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wfae-uyd7-ybc3
48
url VCID-zc7p-7yts-5yae
vulnerability_id VCID-zc7p-7yts-5yae
summary The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-42333
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.2673
published_at 2026-04-12T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26682
published_at 2026-04-16T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26673
published_at 2026-04-13T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26826
published_at 2026-04-02T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26866
published_at 2026-04-04T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26652
published_at 2026-04-07T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.2672
published_at 2026-04-08T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.2677
published_at 2026-04-09T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26774
published_at 2026-04-11T12:55:00Z
9
value 0.00131
scoring_system epss
scoring_elements 0.32641
published_at 2026-04-21T12:55:00Z
10
value 0.00131
scoring_system epss
scoring_elements 0.3267
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-42333
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42333
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689
reference_id 1088689
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689
4
reference_url https://support.zabbix.com/browse/ZBX-25629
reference_id ZBX-25629
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:54:27Z/
url https://support.zabbix.com/browse/ZBX-25629
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2024-42333
risk_score 0.7
exploitability 0.5
weighted_severity 1.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zc7p-7yts-5yae
49
url VCID-zrfp-skzu-cbet
vulnerability_id VCID-zrfp-skzu-cbet
summary When a URL is added to the map element, it is recorded in the database with sequential IDs. Upon adding a new URL, the system retrieves the last sysmapelementurlid value and increments it by one. However, an issue arises when a user manually changes the sysmapelementurlid value by adding sysmapelementurlid + 1. This action prevents others from adding URLs to the map element.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-22117
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17788
published_at 2026-04-21T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17795
published_at 2026-04-13T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.1774
published_at 2026-04-16T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.1775
published_at 2026-04-18T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.1797
published_at 2026-04-02T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.18024
published_at 2026-04-04T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17723
published_at 2026-04-07T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17811
published_at 2026-04-08T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17871
published_at 2026-04-09T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17887
published_at 2026-04-11T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17844
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-22117
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22117
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22117
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://support.zabbix.com/browse/ZBX-25610
reference_id ZBX-25610
reference_type
scores
0
value 2.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-26T15:03:28Z/
url https://support.zabbix.com/browse/ZBX-25610
fixed_packages
0
url pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-1xr6-n296-cyfd
2
vulnerability VCID-3g1d-2tvh-akh4
3
vulnerability VCID-3qru-uxsd-e3c8
4
vulnerability VCID-464s-8ex9-kqdz
5
vulnerability VCID-4s92-5es4-yka5
6
vulnerability VCID-4uxg-fxv7-rua8
7
vulnerability VCID-547a-p94b-6fep
8
vulnerability VCID-5nmy-hdh8-xbg1
9
vulnerability VCID-5s7j-6aea-qucr
10
vulnerability VCID-5t3e-bfve-d3he
11
vulnerability VCID-673b-qsd3-e3hz
12
vulnerability VCID-6u3x-x7qt-g3fa
13
vulnerability VCID-76qf-8jm4-8kct
14
vulnerability VCID-7bzf-3c9x-8qc4
15
vulnerability VCID-7f3g-hebk-3qad
16
vulnerability VCID-7yp1-231f-a3eq
17
vulnerability VCID-9jfn-6nvg-a3b6
18
vulnerability VCID-9z8h-gg7t-b7f8
19
vulnerability VCID-aetr-jrab-6fg5
20
vulnerability VCID-b8tm-2187-wkhz
21
vulnerability VCID-batr-txtv-s3cf
22
vulnerability VCID-cdyd-79m9-pyhv
23
vulnerability VCID-cuqx-wxkd-nffa
24
vulnerability VCID-d7uk-h423-77f5
25
vulnerability VCID-dej6-dxbp-a3bt
26
vulnerability VCID-ftt2-5jnt-9ye2
27
vulnerability VCID-fxqr-51kp-3ber
28
vulnerability VCID-gp3f-yz9h-eqax
29
vulnerability VCID-gyqk-zsww-ykdj
30
vulnerability VCID-kx3g-p2zj-duaj
31
vulnerability VCID-mhx5-hcg2-wfc4
32
vulnerability VCID-n5md-76wa-dbaa
33
vulnerability VCID-nrkb-pzcu-8ueg
34
vulnerability VCID-nyhx-57xy-wugc
35
vulnerability VCID-psak-h1x6-1kca
36
vulnerability VCID-qzp5-px2f-vqc8
37
vulnerability VCID-qzzk-mcfu-sfhv
38
vulnerability VCID-r65p-6wkq-sfb9
39
vulnerability VCID-r8yr-aet5-yydn
40
vulnerability VCID-ry8x-mjbp-qqct
41
vulnerability VCID-s1mb-1gsj-pbed
42
vulnerability VCID-sudd-unuw-wqa9
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uxdf-6tyd-rucd
45
vulnerability VCID-vkfp-asar-7bhw
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-zc7p-7yts-5yae
48
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1
1
url pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
purl pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1
aliases CVE-2024-22117
risk_score 0.7
exploitability 0.5
weighted_severity 1.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zrfp-skzu-cbet
Fixing_vulnerabilities
0
url VCID-9t49-tzah-zkhb
vulnerability_id VCID-9t49-tzah-zkhb
summary Zabbix through 4.4.0alpha1 allows User Enumeration. With login requests, it is possible to enumerate application usernames based on the variability of server responses (e.g., the "Login name or password is incorrect" and "No permissions for system access" messages, or just blocking for a number of seconds). This affects both api_jsonrpc.php and index.php.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15132
reference_id
reference_type
scores
0
value 0.00412
scoring_system epss
scoring_elements 0.61337
published_at 2026-04-01T12:55:00Z
1
value 0.00412
scoring_system epss
scoring_elements 0.61413
published_at 2026-04-02T12:55:00Z
2
value 0.00412
scoring_system epss
scoring_elements 0.61441
published_at 2026-04-04T12:55:00Z
3
value 0.00412
scoring_system epss
scoring_elements 0.61412
published_at 2026-04-07T12:55:00Z
4
value 0.00412
scoring_system epss
scoring_elements 0.61459
published_at 2026-04-08T12:55:00Z
5
value 0.00412
scoring_system epss
scoring_elements 0.61475
published_at 2026-04-09T12:55:00Z
6
value 0.00412
scoring_system epss
scoring_elements 0.61496
published_at 2026-04-11T12:55:00Z
7
value 0.00412
scoring_system epss
scoring_elements 0.61483
published_at 2026-04-12T12:55:00Z
8
value 0.00462
scoring_system epss
scoring_elements 0.64186
published_at 2026-04-13T12:55:00Z
9
value 0.00522
scoring_system epss
scoring_elements 0.66923
published_at 2026-04-16T12:55:00Z
10
value 0.00522
scoring_system epss
scoring_elements 0.66938
published_at 2026-04-18T12:55:00Z
11
value 0.00522
scoring_system epss
scoring_elements 0.66921
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15132
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15132
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935027
reference_id 935027
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935027
3
reference_url https://usn.ubuntu.com/USN-4767-1/
reference_id USN-USN-4767-1
reference_type
scores
url https://usn.ubuntu.com/USN-4767-1/
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-18fv-tqjq-p3ce
2
vulnerability VCID-1xr6-n296-cyfd
3
vulnerability VCID-2hd4-rbph-5qd8
4
vulnerability VCID-3g1d-2tvh-akh4
5
vulnerability VCID-3qru-uxsd-e3c8
6
vulnerability VCID-464s-8ex9-kqdz
7
vulnerability VCID-4s92-5es4-yka5
8
vulnerability VCID-4uxg-fxv7-rua8
9
vulnerability VCID-547a-p94b-6fep
10
vulnerability VCID-5nmy-hdh8-xbg1
11
vulnerability VCID-5s7j-6aea-qucr
12
vulnerability VCID-673b-qsd3-e3hz
13
vulnerability VCID-69kr-fmzb-nbdr
14
vulnerability VCID-6u3x-x7qt-g3fa
15
vulnerability VCID-7bzf-3c9x-8qc4
16
vulnerability VCID-7f3g-hebk-3qad
17
vulnerability VCID-7yp1-231f-a3eq
18
vulnerability VCID-8cpy-mqfn-y3f9
19
vulnerability VCID-9aju-xvg1-n7e5
20
vulnerability VCID-9z8h-gg7t-b7f8
21
vulnerability VCID-aetr-jrab-6fg5
22
vulnerability VCID-b8tm-2187-wkhz
23
vulnerability VCID-batr-txtv-s3cf
24
vulnerability VCID-cdyd-79m9-pyhv
25
vulnerability VCID-cuqx-wxkd-nffa
26
vulnerability VCID-d7uk-h423-77f5
27
vulnerability VCID-dej6-dxbp-a3bt
28
vulnerability VCID-ftt2-5jnt-9ye2
29
vulnerability VCID-fxqr-51kp-3ber
30
vulnerability VCID-gbn9-b2t2-5fbs
31
vulnerability VCID-gp3f-yz9h-eqax
32
vulnerability VCID-kx3g-p2zj-duaj
33
vulnerability VCID-mggj-rvdd-eqc6
34
vulnerability VCID-mhx5-hcg2-wfc4
35
vulnerability VCID-nrkb-pzcu-8ueg
36
vulnerability VCID-psak-h1x6-1kca
37
vulnerability VCID-qhxc-w75p-kqaj
38
vulnerability VCID-qzp5-px2f-vqc8
39
vulnerability VCID-qzzk-mcfu-sfhv
40
vulnerability VCID-r65p-6wkq-sfb9
41
vulnerability VCID-r8yr-aet5-yydn
42
vulnerability VCID-s1mb-1gsj-pbed
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uu3f-3rbn-9fad
45
vulnerability VCID-uxdf-6tyd-rucd
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-wfae-uyd7-ybc3
48
vulnerability VCID-zc7p-7yts-5yae
49
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1
aliases CVE-2019-15132
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9t49-tzah-zkhb
1
url VCID-f837-pma5-jyha
vulnerability_id VCID-f837-pma5-jyha
summary Zabbix before 5.0 represents passwords in the users table with unsalted MD5.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7484
reference_id
reference_type
scores
0
value 0.00212
scoring_system epss
scoring_elements 0.43672
published_at 2026-04-21T12:55:00Z
1
value 0.00212
scoring_system epss
scoring_elements 0.43647
published_at 2026-04-01T12:55:00Z
2
value 0.00212
scoring_system epss
scoring_elements 0.43704
published_at 2026-04-12T12:55:00Z
3
value 0.00212
scoring_system epss
scoring_elements 0.43728
published_at 2026-04-04T12:55:00Z
4
value 0.00212
scoring_system epss
scoring_elements 0.43663
published_at 2026-04-07T12:55:00Z
5
value 0.00212
scoring_system epss
scoring_elements 0.43713
published_at 2026-04-08T12:55:00Z
6
value 0.00212
scoring_system epss
scoring_elements 0.43716
published_at 2026-04-09T12:55:00Z
7
value 0.00212
scoring_system epss
scoring_elements 0.43736
published_at 2026-04-11T12:55:00Z
8
value 0.00212
scoring_system epss
scoring_elements 0.43687
published_at 2026-04-13T12:55:00Z
9
value 0.00212
scoring_system epss
scoring_elements 0.43749
published_at 2026-04-16T12:55:00Z
10
value 0.00212
scoring_system epss
scoring_elements 0.43739
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7484
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7484
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-18fv-tqjq-p3ce
2
vulnerability VCID-1xr6-n296-cyfd
3
vulnerability VCID-2hd4-rbph-5qd8
4
vulnerability VCID-3g1d-2tvh-akh4
5
vulnerability VCID-3qru-uxsd-e3c8
6
vulnerability VCID-464s-8ex9-kqdz
7
vulnerability VCID-4s92-5es4-yka5
8
vulnerability VCID-4uxg-fxv7-rua8
9
vulnerability VCID-547a-p94b-6fep
10
vulnerability VCID-5nmy-hdh8-xbg1
11
vulnerability VCID-5s7j-6aea-qucr
12
vulnerability VCID-673b-qsd3-e3hz
13
vulnerability VCID-69kr-fmzb-nbdr
14
vulnerability VCID-6u3x-x7qt-g3fa
15
vulnerability VCID-7bzf-3c9x-8qc4
16
vulnerability VCID-7f3g-hebk-3qad
17
vulnerability VCID-7yp1-231f-a3eq
18
vulnerability VCID-8cpy-mqfn-y3f9
19
vulnerability VCID-9aju-xvg1-n7e5
20
vulnerability VCID-9z8h-gg7t-b7f8
21
vulnerability VCID-aetr-jrab-6fg5
22
vulnerability VCID-b8tm-2187-wkhz
23
vulnerability VCID-batr-txtv-s3cf
24
vulnerability VCID-cdyd-79m9-pyhv
25
vulnerability VCID-cuqx-wxkd-nffa
26
vulnerability VCID-d7uk-h423-77f5
27
vulnerability VCID-dej6-dxbp-a3bt
28
vulnerability VCID-ftt2-5jnt-9ye2
29
vulnerability VCID-fxqr-51kp-3ber
30
vulnerability VCID-gbn9-b2t2-5fbs
31
vulnerability VCID-gp3f-yz9h-eqax
32
vulnerability VCID-kx3g-p2zj-duaj
33
vulnerability VCID-mggj-rvdd-eqc6
34
vulnerability VCID-mhx5-hcg2-wfc4
35
vulnerability VCID-nrkb-pzcu-8ueg
36
vulnerability VCID-psak-h1x6-1kca
37
vulnerability VCID-qhxc-w75p-kqaj
38
vulnerability VCID-qzp5-px2f-vqc8
39
vulnerability VCID-qzzk-mcfu-sfhv
40
vulnerability VCID-r65p-6wkq-sfb9
41
vulnerability VCID-r8yr-aet5-yydn
42
vulnerability VCID-s1mb-1gsj-pbed
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uu3f-3rbn-9fad
45
vulnerability VCID-uxdf-6tyd-rucd
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-wfae-uyd7-ybc3
48
vulnerability VCID-zc7p-7yts-5yae
49
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1
aliases CVE-2013-7484
risk_score 1.1
exploitability 0.5
weighted_severity 2.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f837-pma5-jyha
2
url VCID-nvpx-ucxf-xkgt
vulnerability_id VCID-nvpx-ucxf-xkgt
summary Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15803
reference_id
reference_type
scores
0
value 0.02092
scoring_system epss
scoring_elements 0.83966
published_at 2026-04-01T12:55:00Z
1
value 0.02092
scoring_system epss
scoring_elements 0.83998
published_at 2026-04-07T12:55:00Z
2
value 0.02092
scoring_system epss
scoring_elements 0.84021
published_at 2026-04-08T12:55:00Z
3
value 0.02092
scoring_system epss
scoring_elements 0.84028
published_at 2026-04-09T12:55:00Z
4
value 0.02092
scoring_system epss
scoring_elements 0.84045
published_at 2026-04-11T12:55:00Z
5
value 0.02092
scoring_system epss
scoring_elements 0.84038
published_at 2026-04-12T12:55:00Z
6
value 0.02092
scoring_system epss
scoring_elements 0.8398
published_at 2026-04-02T12:55:00Z
7
value 0.02092
scoring_system epss
scoring_elements 0.83995
published_at 2026-04-04T12:55:00Z
8
value 0.02305
scoring_system epss
scoring_elements 0.84748
published_at 2026-04-13T12:55:00Z
9
value 0.05067
scoring_system epss
scoring_elements 0.89804
published_at 2026-04-16T12:55:00Z
10
value 0.05067
scoring_system epss
scoring_elements 0.89805
published_at 2026-04-18T12:55:00Z
11
value 0.05067
scoring_system epss
scoring_elements 0.89799
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15803
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15803
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966146
reference_id 966146
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966146
4
reference_url https://usn.ubuntu.com/USN-4767-1/
reference_id USN-USN-4767-1
reference_type
scores
url https://usn.ubuntu.com/USN-4767-1/
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-18fv-tqjq-p3ce
2
vulnerability VCID-1xr6-n296-cyfd
3
vulnerability VCID-2hd4-rbph-5qd8
4
vulnerability VCID-3g1d-2tvh-akh4
5
vulnerability VCID-3qru-uxsd-e3c8
6
vulnerability VCID-464s-8ex9-kqdz
7
vulnerability VCID-4s92-5es4-yka5
8
vulnerability VCID-4uxg-fxv7-rua8
9
vulnerability VCID-547a-p94b-6fep
10
vulnerability VCID-5nmy-hdh8-xbg1
11
vulnerability VCID-5s7j-6aea-qucr
12
vulnerability VCID-673b-qsd3-e3hz
13
vulnerability VCID-69kr-fmzb-nbdr
14
vulnerability VCID-6u3x-x7qt-g3fa
15
vulnerability VCID-7bzf-3c9x-8qc4
16
vulnerability VCID-7f3g-hebk-3qad
17
vulnerability VCID-7yp1-231f-a3eq
18
vulnerability VCID-8cpy-mqfn-y3f9
19
vulnerability VCID-9aju-xvg1-n7e5
20
vulnerability VCID-9z8h-gg7t-b7f8
21
vulnerability VCID-aetr-jrab-6fg5
22
vulnerability VCID-b8tm-2187-wkhz
23
vulnerability VCID-batr-txtv-s3cf
24
vulnerability VCID-cdyd-79m9-pyhv
25
vulnerability VCID-cuqx-wxkd-nffa
26
vulnerability VCID-d7uk-h423-77f5
27
vulnerability VCID-dej6-dxbp-a3bt
28
vulnerability VCID-ftt2-5jnt-9ye2
29
vulnerability VCID-fxqr-51kp-3ber
30
vulnerability VCID-gbn9-b2t2-5fbs
31
vulnerability VCID-gp3f-yz9h-eqax
32
vulnerability VCID-kx3g-p2zj-duaj
33
vulnerability VCID-mggj-rvdd-eqc6
34
vulnerability VCID-mhx5-hcg2-wfc4
35
vulnerability VCID-nrkb-pzcu-8ueg
36
vulnerability VCID-psak-h1x6-1kca
37
vulnerability VCID-qhxc-w75p-kqaj
38
vulnerability VCID-qzp5-px2f-vqc8
39
vulnerability VCID-qzzk-mcfu-sfhv
40
vulnerability VCID-r65p-6wkq-sfb9
41
vulnerability VCID-r8yr-aet5-yydn
42
vulnerability VCID-s1mb-1gsj-pbed
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uu3f-3rbn-9fad
45
vulnerability VCID-uxdf-6tyd-rucd
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-wfae-uyd7-ybc3
48
vulnerability VCID-zc7p-7yts-5yae
49
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1
aliases CVE-2020-15803
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nvpx-ucxf-xkgt
3
url VCID-upzh-6yjy-tff3
vulnerability_id VCID-upzh-6yjy-tff3
summary In Zabbix from 4.0.x before 4.0.28rc1, 5.0.0alpha1 before 5.0.10rc1, 5.2.x before 5.2.6rc1, and 5.4.0alpha1 before 5.4.0beta2, the CControllerAuthenticationUpdate controller lacks a CSRF protection mechanism. The code inside this controller calls diableSIDValidation inside the init() method. An attacker doesn't have to know Zabbix user login credentials, but has to know the correct Zabbix URL and contact information of an existing user with sufficient privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-27927
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22533
published_at 2026-04-21T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22587
published_at 2026-04-16T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22583
published_at 2026-04-18T12:55:00Z
3
value 0.00125
scoring_system epss
scoring_elements 0.31691
published_at 2026-04-13T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.34931
published_at 2026-04-08T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.34781
published_at 2026-04-01T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.34964
published_at 2026-04-11T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.34928
published_at 2026-04-12T12:55:00Z
8
value 0.00145
scoring_system epss
scoring_elements 0.3496
published_at 2026-04-09T12:55:00Z
9
value 0.00145
scoring_system epss
scoring_elements 0.3498
published_at 2026-04-02T12:55:00Z
10
value 0.00145
scoring_system epss
scoring_elements 0.35006
published_at 2026-04-04T12:55:00Z
11
value 0.00145
scoring_system epss
scoring_elements 0.34886
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-27927
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27927
2
reference_url https://security.archlinux.org/AVG-1771
reference_id AVG-1771
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1771
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-18fv-tqjq-p3ce
2
vulnerability VCID-1xr6-n296-cyfd
3
vulnerability VCID-2hd4-rbph-5qd8
4
vulnerability VCID-3g1d-2tvh-akh4
5
vulnerability VCID-3qru-uxsd-e3c8
6
vulnerability VCID-464s-8ex9-kqdz
7
vulnerability VCID-4s92-5es4-yka5
8
vulnerability VCID-4uxg-fxv7-rua8
9
vulnerability VCID-547a-p94b-6fep
10
vulnerability VCID-5nmy-hdh8-xbg1
11
vulnerability VCID-5s7j-6aea-qucr
12
vulnerability VCID-673b-qsd3-e3hz
13
vulnerability VCID-69kr-fmzb-nbdr
14
vulnerability VCID-6u3x-x7qt-g3fa
15
vulnerability VCID-7bzf-3c9x-8qc4
16
vulnerability VCID-7f3g-hebk-3qad
17
vulnerability VCID-7yp1-231f-a3eq
18
vulnerability VCID-8cpy-mqfn-y3f9
19
vulnerability VCID-9aju-xvg1-n7e5
20
vulnerability VCID-9z8h-gg7t-b7f8
21
vulnerability VCID-aetr-jrab-6fg5
22
vulnerability VCID-b8tm-2187-wkhz
23
vulnerability VCID-batr-txtv-s3cf
24
vulnerability VCID-cdyd-79m9-pyhv
25
vulnerability VCID-cuqx-wxkd-nffa
26
vulnerability VCID-d7uk-h423-77f5
27
vulnerability VCID-dej6-dxbp-a3bt
28
vulnerability VCID-ftt2-5jnt-9ye2
29
vulnerability VCID-fxqr-51kp-3ber
30
vulnerability VCID-gbn9-b2t2-5fbs
31
vulnerability VCID-gp3f-yz9h-eqax
32
vulnerability VCID-kx3g-p2zj-duaj
33
vulnerability VCID-mggj-rvdd-eqc6
34
vulnerability VCID-mhx5-hcg2-wfc4
35
vulnerability VCID-nrkb-pzcu-8ueg
36
vulnerability VCID-psak-h1x6-1kca
37
vulnerability VCID-qhxc-w75p-kqaj
38
vulnerability VCID-qzp5-px2f-vqc8
39
vulnerability VCID-qzzk-mcfu-sfhv
40
vulnerability VCID-r65p-6wkq-sfb9
41
vulnerability VCID-r8yr-aet5-yydn
42
vulnerability VCID-s1mb-1gsj-pbed
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uu3f-3rbn-9fad
45
vulnerability VCID-uxdf-6tyd-rucd
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-wfae-uyd7-ybc3
48
vulnerability VCID-zc7p-7yts-5yae
49
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1
aliases CVE-2021-27927
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-upzh-6yjy-tff3
4
url VCID-uxf8-8rzq-kfhm
vulnerability_id VCID-uxf8-8rzq-kfhm
summary An issue was discovered in zabbix.php?action=dashboard.view&dashboardid=1 in Zabbix through 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any Username/Password (i.e., anonymously). All created elements (Dashboard/Report/Screen/Map) are accessible by other users and by an admin.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17382
reference_id
reference_type
scores
0
value 0.93689
scoring_system epss
scoring_elements 0.99846
published_at 2026-04-02T12:55:00Z
1
value 0.93689
scoring_system epss
scoring_elements 0.99847
published_at 2026-04-11T12:55:00Z
2
value 0.93689
scoring_system epss
scoring_elements 0.99848
published_at 2026-04-21T12:55:00Z
3
value 0.93689
scoring_system epss
scoring_elements 0.99849
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17382
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17382
2
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html
3
reference_url https://www.exploit-db.com/exploits/47467
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/47467
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17382
reference_id CVE-2019-17382
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:N
1
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-17382
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-18fv-tqjq-p3ce
2
vulnerability VCID-1xr6-n296-cyfd
3
vulnerability VCID-2hd4-rbph-5qd8
4
vulnerability VCID-3g1d-2tvh-akh4
5
vulnerability VCID-3qru-uxsd-e3c8
6
vulnerability VCID-464s-8ex9-kqdz
7
vulnerability VCID-4s92-5es4-yka5
8
vulnerability VCID-4uxg-fxv7-rua8
9
vulnerability VCID-547a-p94b-6fep
10
vulnerability VCID-5nmy-hdh8-xbg1
11
vulnerability VCID-5s7j-6aea-qucr
12
vulnerability VCID-673b-qsd3-e3hz
13
vulnerability VCID-69kr-fmzb-nbdr
14
vulnerability VCID-6u3x-x7qt-g3fa
15
vulnerability VCID-7bzf-3c9x-8qc4
16
vulnerability VCID-7f3g-hebk-3qad
17
vulnerability VCID-7yp1-231f-a3eq
18
vulnerability VCID-8cpy-mqfn-y3f9
19
vulnerability VCID-9aju-xvg1-n7e5
20
vulnerability VCID-9z8h-gg7t-b7f8
21
vulnerability VCID-aetr-jrab-6fg5
22
vulnerability VCID-b8tm-2187-wkhz
23
vulnerability VCID-batr-txtv-s3cf
24
vulnerability VCID-cdyd-79m9-pyhv
25
vulnerability VCID-cuqx-wxkd-nffa
26
vulnerability VCID-d7uk-h423-77f5
27
vulnerability VCID-dej6-dxbp-a3bt
28
vulnerability VCID-ftt2-5jnt-9ye2
29
vulnerability VCID-fxqr-51kp-3ber
30
vulnerability VCID-gbn9-b2t2-5fbs
31
vulnerability VCID-gp3f-yz9h-eqax
32
vulnerability VCID-kx3g-p2zj-duaj
33
vulnerability VCID-mggj-rvdd-eqc6
34
vulnerability VCID-mhx5-hcg2-wfc4
35
vulnerability VCID-nrkb-pzcu-8ueg
36
vulnerability VCID-psak-h1x6-1kca
37
vulnerability VCID-qhxc-w75p-kqaj
38
vulnerability VCID-qzp5-px2f-vqc8
39
vulnerability VCID-qzzk-mcfu-sfhv
40
vulnerability VCID-r65p-6wkq-sfb9
41
vulnerability VCID-r8yr-aet5-yydn
42
vulnerability VCID-s1mb-1gsj-pbed
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uu3f-3rbn-9fad
45
vulnerability VCID-uxdf-6tyd-rucd
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-wfae-uyd7-ybc3
48
vulnerability VCID-zc7p-7yts-5yae
49
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1
aliases CVE-2019-17382
risk_score 10.0
exploitability 2.0
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uxf8-8rzq-kfhm
5
url VCID-xjj4-u4gj-x7ea
vulnerability_id VCID-xjj4-u4gj-x7ea
summary Request to LDAP is sent before user permissions are checked.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32723
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.31792
published_at 2026-04-21T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.31809
published_at 2026-04-13T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.31841
published_at 2026-04-16T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31821
published_at 2026-04-18T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31937
published_at 2026-04-02T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31979
published_at 2026-04-04T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31798
published_at 2026-04-07T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.3185
published_at 2026-04-08T12:55:00Z
8
value 0.00126
scoring_system epss
scoring_elements 0.3188
published_at 2026-04-09T12:55:00Z
9
value 0.00126
scoring_system epss
scoring_elements 0.31884
published_at 2026-04-11T12:55:00Z
10
value 0.00126
scoring_system epss
scoring_elements 0.31845
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32723
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32723
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877
reference_id 1053877
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877
3
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html
reference_id msg00012.html
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:43:34Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html
4
reference_url https://support.zabbix.com/browse/ZBX-23230
reference_id ZBX-23230
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:43:34Z/
url https://support.zabbix.com/browse/ZBX-23230
fixed_packages
0
url pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1
purl pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-172p-q6d5-9ya3
1
vulnerability VCID-18fv-tqjq-p3ce
2
vulnerability VCID-1xr6-n296-cyfd
3
vulnerability VCID-2hd4-rbph-5qd8
4
vulnerability VCID-3g1d-2tvh-akh4
5
vulnerability VCID-3qru-uxsd-e3c8
6
vulnerability VCID-464s-8ex9-kqdz
7
vulnerability VCID-4s92-5es4-yka5
8
vulnerability VCID-4uxg-fxv7-rua8
9
vulnerability VCID-547a-p94b-6fep
10
vulnerability VCID-5nmy-hdh8-xbg1
11
vulnerability VCID-5s7j-6aea-qucr
12
vulnerability VCID-673b-qsd3-e3hz
13
vulnerability VCID-69kr-fmzb-nbdr
14
vulnerability VCID-6u3x-x7qt-g3fa
15
vulnerability VCID-7bzf-3c9x-8qc4
16
vulnerability VCID-7f3g-hebk-3qad
17
vulnerability VCID-7yp1-231f-a3eq
18
vulnerability VCID-8cpy-mqfn-y3f9
19
vulnerability VCID-9aju-xvg1-n7e5
20
vulnerability VCID-9z8h-gg7t-b7f8
21
vulnerability VCID-aetr-jrab-6fg5
22
vulnerability VCID-b8tm-2187-wkhz
23
vulnerability VCID-batr-txtv-s3cf
24
vulnerability VCID-cdyd-79m9-pyhv
25
vulnerability VCID-cuqx-wxkd-nffa
26
vulnerability VCID-d7uk-h423-77f5
27
vulnerability VCID-dej6-dxbp-a3bt
28
vulnerability VCID-ftt2-5jnt-9ye2
29
vulnerability VCID-fxqr-51kp-3ber
30
vulnerability VCID-gbn9-b2t2-5fbs
31
vulnerability VCID-gp3f-yz9h-eqax
32
vulnerability VCID-kx3g-p2zj-duaj
33
vulnerability VCID-mggj-rvdd-eqc6
34
vulnerability VCID-mhx5-hcg2-wfc4
35
vulnerability VCID-nrkb-pzcu-8ueg
36
vulnerability VCID-psak-h1x6-1kca
37
vulnerability VCID-qhxc-w75p-kqaj
38
vulnerability VCID-qzp5-px2f-vqc8
39
vulnerability VCID-qzzk-mcfu-sfhv
40
vulnerability VCID-r65p-6wkq-sfb9
41
vulnerability VCID-r8yr-aet5-yydn
42
vulnerability VCID-s1mb-1gsj-pbed
43
vulnerability VCID-uh37-bv9z-1bdz
44
vulnerability VCID-uu3f-3rbn-9fad
45
vulnerability VCID-uxdf-6tyd-rucd
46
vulnerability VCID-wczj-cv1m-7qce
47
vulnerability VCID-wfae-uyd7-ybc3
48
vulnerability VCID-zc7p-7yts-5yae
49
vulnerability VCID-zrfp-skzu-cbet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1
aliases CVE-2023-32723
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xjj4-u4gj-x7ea
Risk_score3.9
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1