Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (15)
Vulnerability Summary Aliases
VCID-464s-8ex9-kqdz A stored XSS has been found in the Zabbix web application in the Maps element if a URL field is set with spaces before URL. CVE-2023-32721
VCID-4uxg-fxv7-rua8 An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server. CVE-2023-32727
VCID-547a-p94b-6fep The zabbix/src/libs/zbxjson module is vulnerable to a buffer overflow when parsing JSON files via zbx_json_open. CVE-2023-32722
VCID-5s7j-6aea-qucr Stored or persistent cross-site scripting (XSS) is a type of XSS where the attacker first sends the payload to the web application, then the application saves the payload (e.g., in a database or server-side text files), and finally, the application unintentionally executes the payload for every victim visiting its web pages. CVE-2023-29454
VCID-673b-qsd3-e3hz Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script is activated through a link, which sends a request to a website with a vulnerability that enables execution of malicious scripts. CVE-2023-29455
VCID-6u3x-x7qt-g3fa JavaScript preprocessing, webhooks and global scripts can cause uncontrolled CPU, memory, and disk I/O utilization. Preprocessing/webhook/global script configuration and testing are only available to Administrative roles (Admin and Superadmin). Administrative privileges should be typically granted to users who need to perform tasks that require more control over the system. The security risk is limited because not all users have this level of access. CVE-2023-29449
VCID-9z8h-gg7t-b7f8 Memory pointer is in a property of the Ducktape object. This leads to multiple vulnerabilities related to direct memory access and manipulation. CVE-2023-32724
VCID-cdyd-79m9-pyhv Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g., "var a = {{.}}"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template. Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution. CVE-2023-29453
VCID-cuqx-wxkd-nffa Duktape is an 3rd-party embeddable JavaScript engine, with a focus on portability and compact footprint. When adding too many values in valstack JavaScript will crash. This issue occurs due to bug in Duktape 2.6 which is an 3rd-party solution that we use. CVE-2023-29458
VCID-ftt2-5jnt-9ye2 Reflected XSS attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script can be activated through Action form fields, which can be sent as request to a website with a vulnerability that enables execution of malicious scripts. CVE-2023-29457
VCID-gyqk-zsww-ykdj Specially crafted string can cause a buffer overrun in the JSON parser library leading to a crash of the Zabbix Server or a Zabbix Proxy. CVE-2023-29451
VCID-kx3g-p2zj-duaj URL validation scheme receives input from a user and then parses it to identify its various components. The validation scheme can ensure that all URL components comply with internet standards. CVE-2023-29456
VCID-nyhx-57xy-wugc Currently, geomap configuration (Administration -> General -> Geographical maps) allows using HTML in the field “Attribution text” when selected “Other” Tile provider. CVE-2023-29452
VCID-r65p-6wkq-sfb9 JavaScript pre-processing can be used by the attacker to gain access to the file system (read-only access on behalf of user "zabbix") on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data. CVE-2023-29450
VCID-vkfp-asar-7bhw The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user. CVE-2023-32725

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-03T07:59:10.463519+00:00 Debian Importer Fixing VCID-4uxg-fxv7-rua8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:10.348001+00:00 Debian Importer Fixing VCID-vkfp-asar-7bhw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:10.289338+00:00 Debian Importer Fixing VCID-9z8h-gg7t-b7f8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:10.177109+00:00 Debian Importer Fixing VCID-547a-p94b-6fep https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:10.114265+00:00 Debian Importer Fixing VCID-464s-8ex9-kqdz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:10.042366+00:00 Debian Importer Fixing VCID-cuqx-wxkd-nffa https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:09.979332+00:00 Debian Importer Fixing VCID-ftt2-5jnt-9ye2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:09.915985+00:00 Debian Importer Fixing VCID-kx3g-p2zj-duaj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:09.853335+00:00 Debian Importer Fixing VCID-673b-qsd3-e3hz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:09.790681+00:00 Debian Importer Fixing VCID-5s7j-6aea-qucr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:09.727160+00:00 Debian Importer Fixing VCID-cdyd-79m9-pyhv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:09.681956+00:00 Debian Importer Fixing VCID-nyhx-57xy-wugc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:09.617780+00:00 Debian Importer Fixing VCID-gyqk-zsww-ykdj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:09.553227+00:00 Debian Importer Fixing VCID-r65p-6wkq-sfb9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:59:09.487525+00:00 Debian Importer Fixing VCID-6u3x-x7qt-g3fa https://security-tracker.debian.org/tracker/data/json 38.1.0