Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/zoneminder@1.36.33%2Bdfsg1-1
purl pkg:deb/debian/zoneminder@1.36.33%2Bdfsg1-1
Next non-vulnerable version 1.36.35+dfsg1-1
Latest non-vulnerable version 1.36.35+dfsg1-1
Risk 4.4
Vulnerabilities affecting this package (4)
Vulnerability Summary Fixed by
VCID-3xuk-942c-kkbf
Aliases:
CVE-2024-43359
ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder has a cross-site scripting vulnerability in the montagereview via the displayinterval, speed, and scale parameters. This vulnerability is fixed in 1.36.34 and 1.37.61.
1.36.35+dfsg1-1
Affected by 0 other vulnerabilities.
VCID-4mfm-zzrx-6ffb
Aliases:
CVE-2024-43358
ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder has a cross-site scripting vulnerability in the filter view via the filter[Id]. This vulnerability is fixed in 1.36.34 and 1.37.61.
1.36.35+dfsg1-1
Affected by 0 other vulnerabilities.
VCID-7x51-uyq2-9qax
Aliases:
CVE-2023-41884
ZoneMinder is a free, open source Closed-circuit television software application. In WWW/AJAX/watch.php, Line: 51 takes a few parameter in sql query without sanitizing it which makes it vulnerable to sql injection. This vulnerability is fixed in 1.36.34.
1.36.35+dfsg1-1
Affected by 0 other vulnerabilities.
VCID-mdkd-vmcp-afa8
Aliases:
CVE-2024-43360
ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder is affected by a time-based SQL Injection vulnerability. This vulnerability is fixed in 1.36.34 and 1.37.61.
1.36.35+dfsg1-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (13)
Vulnerability Summary Aliases
VCID-4qtk-7myx-vfcd ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 are vulnerable to Unauthenticated Remote Code Execution via Missing Authorization. There are no permissions check on the snapshot action, which expects an id to fetch an existing monitor but can be passed an object to create a new one instead. TriggerOn ends up calling shell_exec using the supplied Id. This issue is fixed in This issue is fixed in versions 1.36.33 and 1.37.33. CVE-2023-26035
VCID-7vc9-wfjb-t3ba ZoneMinder is a free, open source Closed-circuit television software application The file parameter is vulnerable to a cross site scripting vulnerability (XSS) by backing out of the current "tr" "td" brackets. This then allows a malicious user to provide code that will execute when a user views the specific log on the "view=log" page. This vulnerability allows an attacker to store code within the logs that will be executed when loaded by a legitimate user. These actions will be performed with the permission of the victim. This could lead to data loss and/or further exploitation including account takeover. This issue has been addressed in versions `1.36.27` and `1.37.24`. Users are advised to upgrade. Users unable to upgrade should disable database logging. CVE-2022-39285
VCID-95ub-6q5w-p3cm ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 contain an OS Command Injection via daemonControl() in (/web/api/app/Controller/HostController.php). Any authenticated user can construct an api command to execute any shell command as the web user. This issue is patched in versions 1.36.33 and 1.37.33. CVE-2023-26039
VCID-9kh5-715y-pud4 ZoneMinder is a free, open source Closed-circuit television software application. In affected versions authenticated users can bypass CSRF keys by modifying the request supplied to the Zoneminder web application. These modifications include replacing HTTP POST with an HTTP GET and removing the CSRF key from the request. An attacker can take advantage of this by using an HTTP GET request to perform actions with no CSRF protection. This could allow an attacker to cause an authenticated user to perform unexpected actions on the web application. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue. CVE-2022-39290
VCID-d117-rhnc-rkhf ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 are affected by a SQL Injection vulnerability. The (blind) SQL Injection vulnerability is present within the `filter[Query][terms][0][attr]` query string parameter of the `/zm/index.php` endpoint. A user with the View or Edit permissions of Events may execute arbitrary SQL. The resulting impact can include unauthorized data access (and modification), authentication and/or authorization bypass, and remote code execution. CVE-2023-26034
VCID-fyy1-fwys-xkbj ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 contain a Local File Inclusion (Untrusted Search Path) vulnerability via /web/index.php. By controlling $view, any local file ending in .php can be executed. This is supposed to be mitigated by calling detaintPath, however dentaintPath does not properly sandbox the path. This can be exploited by constructing paths like "..././", which get replaced by "../". This issue is patched in versions 1.36.33 and 1.37.33. CVE-2023-26036
VCID-j283-1m9p-13hn ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 are vulnerable to Cross-site Scripting. Log entries can be injected into the database logs, containing a malicious referrer field. This is unescaped when viewing the logs in the web ui. This issue is patched in version 1.36.33. CVE-2023-25825
VCID-jukn-h868-5ugm ZoneMinder is a free, open source Closed-circuit television software application. Affected versions of zoneminder are subject to a vulnerability which allows users with "View" system permissions to inject new data into the logs stored by Zoneminder. This was observed through an HTTP POST request containing log information to the "/zm/index.php" endpoint. Submission is not rate controlled and could affect database performance and/or consume all storage resources. Users are advised to upgrade. There are no known workarounds for this issue. CVE-2022-39291
VCID-kk5d-y2z8-r3g2 ZoneMinder before 1.36.13 allows remote code execution via an invalid language. Ability to create a debug log file at an arbitrary pathname contributes to exploitability. CVE-2022-29806
VCID-mk5h-586t-pyga ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 contain a Local File Inclusion (Untrusted Search Path) vulnerability via web/ajax/modal.php, where an arbitrary php file path can be passed in the request and loaded. This issue is patched in versions 1.36.33 and 1.37.33. CVE-2023-26038
VCID-n8y3-5fb9-kucb ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 contain SQL Injection via malicious jason web token. The Username field of the JWT token was trusted when performing an SQL query to load the user. If an attacker could determine the HASH key used by ZoneMinder, they could generate a malicious JWT token and use it to execute arbitrary SQL. This issue is fixed in versions 1.36.33 and 1.37.33. CVE-2023-26032
VCID-tyu6-8h17-8yh5 ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 contain an SQL Injection. The minTime and maxTime request parameters are not properly validated and could be used execute arbitrary SQL. This issue is fixed in versions 1.36.33 and 1.37.33. CVE-2023-26037
VCID-uybk-r4q9-gyac ZoneMinder is a free, open source Closed-circuit television software application. In affected versions the ZoneMinder API Exposes Database Log contents to user without privileges, allows insertion, modification, deletion of logs without System Privileges. Users are advised yo upgrade as soon as possible. Users unable to upgrade should disable database logging. CVE-2022-39289

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:22:42.813063+00:00 Debian Importer Fixing VCID-mk5h-586t-pyga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:21:59.431943+00:00 Debian Importer Affected by VCID-7x51-uyq2-9qax https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:15:46.188602+00:00 Debian Importer Fixing VCID-jukn-h868-5ugm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:15:20.679281+00:00 Debian Importer Fixing VCID-uybk-r4q9-gyac https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:09:09.064745+00:00 Debian Importer Fixing VCID-7vc9-wfjb-t3ba https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:07:31.560163+00:00 Debian Importer Affected by VCID-3xuk-942c-kkbf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:54:29.978259+00:00 Debian Importer Fixing VCID-kk5d-y2z8-r3g2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:41:04.206770+00:00 Debian Importer Fixing VCID-95ub-6q5w-p3cm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:40:22.577646+00:00 Debian Importer Fixing VCID-4qtk-7myx-vfcd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:33:23.855587+00:00 Debian Importer Fixing VCID-d117-rhnc-rkhf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:27:17.919099+00:00 Debian Importer Affected by VCID-4mfm-zzrx-6ffb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:15:35.763895+00:00 Debian Importer Fixing VCID-9kh5-715y-pud4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:46:03.946780+00:00 Debian Importer Fixing VCID-n8y3-5fb9-kucb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:39:44.273396+00:00 Debian Importer Fixing VCID-tyu6-8h17-8yh5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:31:31.359130+00:00 Debian Importer Fixing VCID-j283-1m9p-13hn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:11:41.324361+00:00 Debian Importer Affected by VCID-mdkd-vmcp-afa8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:50.931242+00:00 Debian Importer Fixing VCID-fyy1-fwys-xkbj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:13:30.323679+00:00 Debian Importer Fixing VCID-mk5h-586t-pyga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:12:52.627896+00:00 Debian Importer Affected by VCID-7x51-uyq2-9qax https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:08:00.178234+00:00 Debian Importer Fixing VCID-jukn-h868-5ugm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:07:40.843856+00:00 Debian Importer Fixing VCID-uybk-r4q9-gyac https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:18:35.258950+00:00 Debian Importer Fixing VCID-7vc9-wfjb-t3ba https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:17:28.634973+00:00 Debian Importer Affected by VCID-3xuk-942c-kkbf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:07:43.468741+00:00 Debian Importer Fixing VCID-kk5d-y2z8-r3g2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:57:40.440505+00:00 Debian Importer Fixing VCID-95ub-6q5w-p3cm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:57:09.876878+00:00 Debian Importer Fixing VCID-4qtk-7myx-vfcd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:52:42.118406+00:00 Debian Importer Fixing VCID-d117-rhnc-rkhf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:48:16.925888+00:00 Debian Importer Affected by VCID-4mfm-zzrx-6ffb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:39:29.567661+00:00 Debian Importer Fixing VCID-9kh5-715y-pud4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:17:02.825351+00:00 Debian Importer Fixing VCID-n8y3-5fb9-kucb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:12:38.041417+00:00 Debian Importer Fixing VCID-tyu6-8h17-8yh5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:06:16.892333+00:00 Debian Importer Fixing VCID-j283-1m9p-13hn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:09:12.842560+00:00 Debian Importer Affected by VCID-mdkd-vmcp-afa8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:51:18.287995+00:00 Debian Importer Fixing VCID-fyy1-fwys-xkbj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-08T20:07:46.088260+00:00 Debian Importer Fixing VCID-mk5h-586t-pyga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T20:07:24.317423+00:00 Debian Importer Affected by VCID-7x51-uyq2-9qax https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T20:04:23.417787+00:00 Debian Importer Fixing VCID-jukn-h868-5ugm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T20:04:10.504424+00:00 Debian Importer Fixing VCID-uybk-r4q9-gyac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:31:50.751655+00:00 Debian Importer Fixing VCID-7vc9-wfjb-t3ba https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:31:07.350150+00:00 Debian Importer Affected by VCID-3xuk-942c-kkbf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:24:51.357815+00:00 Debian Importer Fixing VCID-kk5d-y2z8-r3g2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:18:15.218205+00:00 Debian Importer Fixing VCID-95ub-6q5w-p3cm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:17:53.826455+00:00 Debian Importer Fixing VCID-4qtk-7myx-vfcd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:14:34.941271+00:00 Debian Importer Fixing VCID-d117-rhnc-rkhf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:11:19.760667+00:00 Debian Importer Affected by VCID-4mfm-zzrx-6ffb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:05:18.926275+00:00 Debian Importer Fixing VCID-9kh5-715y-pud4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:50:32.569392+00:00 Debian Importer Fixing VCID-n8y3-5fb9-kucb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:47:20.412555+00:00 Debian Importer Fixing VCID-tyu6-8h17-8yh5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:43:12.859201+00:00 Debian Importer Fixing VCID-j283-1m9p-13hn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:52:05.929056+00:00 Debian Importer Fixing VCID-fyy1-fwys-xkbj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-04T17:58:26.349487+00:00 Debian Importer Affected by VCID-mdkd-vmcp-afa8 https://security-tracker.debian.org/tracker/data/json 38.1.0