Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/zabbix@1:1.8-1?distro=trixie
purl pkg:deb/debian/zabbix@1:1.8-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (5)
Vulnerability Summary Aliases
VCID-3pw5-bega-j7bg The process_trap function in trapper/trapper.c in Zabbix Server before 1.6.6 allows remote attackers to cause a denial of service (crash) via a crafted request with data that lacks an expected : (colon) separator, which triggers a NULL pointer dereference. CVE-2009-4500
VCID-55mr-z77t-xbhh SQL injection vulnerability in the get_history_lastid function in the nodewatcher component in Zabbix Server before 1.6.8 allows remote attackers to execute arbitrary SQL commands via a crafted request, possibly related to the send_history_last_id function in zabbix_server/trapper/nodehistory.c. CVE-2009-4499
VCID-854s-ttw2-hqh6 The node_process_command function in Zabbix Server before 1.8 allows remote attackers to execute arbitrary commands via a crafted request. CVE-2009-4498
VCID-9meu-vgne-hyg7 The zbx_get_next_field function in libs/zbxcommon/str.c in Zabbix Server before 1.6.8 allows remote attackers to cause a denial of service (crash) via a request that lacks expected separators, which triggers a NULL pointer dereference, as demonstrated using the Command keyword. CVE-2009-4501
VCID-zemm-yb4a-4bc5 The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attacks from trusted IP addresses. CVE-2009-4502

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:21:24.082572+00:00 Debian Importer Fixing VCID-3pw5-bega-j7bg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:04:10.225817+00:00 Debian Importer Fixing VCID-zemm-yb4a-4bc5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:02:41.272148+00:00 Debian Importer Fixing VCID-854s-ttw2-hqh6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:18:01.732509+00:00 Debian Importer Fixing VCID-55mr-z77t-xbhh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:58:17.770687+00:00 Debian Importer Fixing VCID-9meu-vgne-hyg7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:27:15.989518+00:00 Debian Importer Fixing VCID-3pw5-bega-j7bg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:14:48.720740+00:00 Debian Importer Fixing VCID-zemm-yb4a-4bc5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:13:43.288139+00:00 Debian Importer Fixing VCID-854s-ttw2-hqh6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:55:54.571391+00:00 Debian Importer Fixing VCID-55mr-z77t-xbhh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:47.088530+00:00 Debian Importer Fixing VCID-9meu-vgne-hyg7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:59:07.217547+00:00 Debian Importer Fixing VCID-zemm-yb4a-4bc5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:07.170720+00:00 Debian Importer Fixing VCID-9meu-vgne-hyg7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:07.123815+00:00 Debian Importer Fixing VCID-3pw5-bega-j7bg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:07.077028+00:00 Debian Importer Fixing VCID-55mr-z77t-xbhh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:07.029617+00:00 Debian Importer Fixing VCID-854s-ttw2-hqh6 https://security-tracker.debian.org/tracker/data/json 38.1.0