Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1035767?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1035767?format=api", "purl": "pkg:deb/debian/zabbix@1:1.1.4-10etch1", "type": "deb", "namespace": "debian", "name": "zabbix", "version": "1:1.1.4-10etch1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "1:7.0.9+dfsg-1~bpo12+1", "latest_non_vulnerable_version": "1:7.0.9+dfsg-1~bpo12+1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96119?format=api", "vulnerability_id": "VCID-172p-q6d5-9ya3", "summary": "Execution time for an unsuccessful login differs when using a non-existing username compared to using an existing one.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36469", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.30546", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.30634", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.30568", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31823", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31773", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31606", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31478", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31394", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31244", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31312", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31319", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31861", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31865", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31826", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31791", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31803", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35726", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35633", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35679", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35753", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36469" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-26255", "reference_id": "ZBX-26255", "reference_type": "", "scores": [ { "value": "2.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:00:32Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-26255" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2024-36469" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-172p-q6d5-9ya3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95100?format=api", "vulnerability_id": "VCID-18fv-tqjq-p3ce", "summary": "An authenticated user can create a link with reflected XSS payload for actions’ pages, and send it to other users. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim. This attack can be implemented with the help of social engineering and expiration of a number of factors - an attacker should have authorized access to the Zabbix Frontend and allowed network connection between a malicious server and victim’s computer, understand attacked infrastructure, be recognized by the victim as a trustee and use trusted communication channel.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24349", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43883", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43886", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43904", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43871", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43854", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43878", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43902", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43832", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.74981", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.75005", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.74978", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.74996", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.75048", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.74904", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.74911", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.74902", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.74938", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.74945", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.74948", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00849", "scoring_system": "epss", "scoring_elements": "0.74955", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24349" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24349", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24349" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" } ], "aliases": [ "CVE-2022-24349" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-18fv-tqjq-p3ce" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95948?format=api", "vulnerability_id": "VCID-1xr6-n296-cyfd", "summary": "The cause of vulnerability is improper validation of form input field “Name” on Graph page in Items section.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-22119", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62231", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.6214", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62086", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62136", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62195", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62175", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62042", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62074", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62043", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62093", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.6211", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.6213", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.6212", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62099", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62143", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62149", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62133", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62131", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62147", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-22119" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22119" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00020.html", "reference_id": "msg00020.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T14:54:06Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00020.html" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-24070", "reference_id": "ZBX-24070", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T14:54:06Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-24070" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2024-22119" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1xr6-n296-cyfd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92257?format=api", "vulnerability_id": "VCID-24sd-pp6s-e3gv", "summary": "Cross-site scripting (XSS) vulnerability in ZABBIX before 1.8.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the profiler.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-5027", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63177", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63236", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63265", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.6323", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63282", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63299", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63317", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.633", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63264", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63301", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63308", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63288", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63307", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.6332", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63318", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63286", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63331", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63383", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63344", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.6337", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63425", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-5027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5027" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652664", "reference_id": "652664", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652664" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2011-5027" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-24sd-pp6s-e3gv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92197?format=api", "vulnerability_id": "VCID-2dx4-612r-afcm", "summary": "Zabbix before 1.8.6 allows remote attackers to obtain sensitive information via an invalid srcfld2 parameter to popup.php, which reveals the installation path in an error message.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3264", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00455", "scoring_system": "epss", "scoring_elements": "0.63742", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00455", "scoring_system": "epss", "scoring_elements": "0.63804", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00455", "scoring_system": "epss", "scoring_elements": "0.6383", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00455", "scoring_system": "epss", "scoring_elements": "0.63788", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00455", "scoring_system": "epss", "scoring_elements": "0.63839", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00455", "scoring_system": "epss", "scoring_elements": "0.63856", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00455", "scoring_system": "epss", "scoring_elements": "0.63869", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00455", "scoring_system": "epss", "scoring_elements": "0.63822", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00455", "scoring_system": "epss", "scoring_elements": "0.63857", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00455", "scoring_system": "epss", "scoring_elements": "0.63866", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00455", "scoring_system": "epss", "scoring_elements": "0.63855", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00455", "scoring_system": "epss", "scoring_elements": "0.63872", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00455", "scoring_system": "epss", "scoring_elements": "0.63884", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00455", "scoring_system": "epss", "scoring_elements": "0.63882", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00455", "scoring_system": "epss", "scoring_elements": "0.63853", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00455", "scoring_system": "epss", "scoring_elements": "0.63897", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00455", "scoring_system": "epss", "scoring_elements": "0.63944", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00455", "scoring_system": "epss", "scoring_elements": "0.63911", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00455", "scoring_system": "epss", "scoring_elements": "0.63938", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00455", "scoring_system": "epss", "scoring_elements": "0.63989", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3264" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3264", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3264" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2011-3264" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2dx4-612r-afcm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95076?format=api", "vulnerability_id": "VCID-2hd4-rbph-5qd8", "summary": "An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23133", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76705", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76477", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76506", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76489", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76521", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76532", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76558", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76537", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76573", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76577", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76565", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76598", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76603", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76617", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76605", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76634", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76652", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76638", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00963", "scoring_system": "epss", "scoring_elements": "0.76656", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23133" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" } ], "aliases": [ "CVE-2022-23133" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2hd4-rbph-5qd8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96211?format=api", "vulnerability_id": "VCID-3g1d-2tvh-akh4", "summary": "Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attacker can send specially crafted requests to the server, which will cause the server to allocate an excessive amount of memory and perform CPU-intensive decompression operations, ultimately leading to a service crash.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45700", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35129", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35106", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35198", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41746", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41796", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41805", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41829", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41783", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41832", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41734", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.4166", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41661", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41583", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41442", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41512", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41528", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41806", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41788", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41817", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45700" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-26253", "reference_id": "ZBX-26253", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T16:27:38Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-26253" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2024-45700" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3g1d-2tvh-akh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92198?format=api", "vulnerability_id": "VCID-3p27-zs76-b3bg", "summary": "popup.php in Zabbix before 1.8.7 allows remote attackers to read the contents of arbitrary database tables via a modified srctbl parameter.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3265", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66587", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66626", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66652", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66675", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.6669", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66697", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66667", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66701", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66714", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66699", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66723", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66735", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66732", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66704", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66748", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66788", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66762", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66781", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00516", "scoring_system": "epss", "scoring_elements": "0.66846", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3265" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3265", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3265" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2011-3265" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3p27-zs76-b3bg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91986?format=api", "vulnerability_id": "VCID-3pw5-bega-j7bg", "summary": "The process_trap function in trapper/trapper.c in Zabbix Server before 1.6.6 allows remote attackers to cause a denial of service (crash) via a crafted request with data that lacks an expected : (colon) separator, which triggers a NULL pointer dereference.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4500", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00734", "scoring_system": "epss", "scoring_elements": "0.72684", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00734", "scoring_system": "epss", "scoring_elements": "0.72692", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00734", "scoring_system": "epss", "scoring_elements": "0.7271", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00734", "scoring_system": "epss", "scoring_elements": "0.72688", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00734", "scoring_system": "epss", "scoring_elements": "0.72727", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00734", "scoring_system": "epss", "scoring_elements": "0.7274", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00734", "scoring_system": "epss", "scoring_elements": "0.72764", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00734", "scoring_system": "epss", "scoring_elements": "0.72747", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00734", "scoring_system": "epss", "scoring_elements": "0.72738", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00734", "scoring_system": "epss", "scoring_elements": "0.7278", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00734", "scoring_system": "epss", "scoring_elements": "0.72791", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00734", "scoring_system": "epss", "scoring_elements": "0.72782", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00734", "scoring_system": "epss", "scoring_elements": "0.72823", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00734", "scoring_system": "epss", "scoring_elements": "0.72832", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00734", "scoring_system": "epss", "scoring_elements": "0.72829", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00734", "scoring_system": "epss", "scoring_elements": "0.72853", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00734", "scoring_system": "epss", "scoring_elements": "0.72878", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00734", "scoring_system": "epss", "scoring_elements": "0.72842", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00734", "scoring_system": "epss", "scoring_elements": "0.72866", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00734", "scoring_system": "epss", "scoring_elements": "0.7292", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4500" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613", "reference_id": "562613", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2009-4500" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3pw5-bega-j7bg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95949?format=api", "vulnerability_id": "VCID-3qru-uxsd-e3c8", "summary": "Zabbix allows to configure SMS notifications. AT command injection occurs on \"Zabbix Server\" because there is no validation of \"Number\" field on Web nor on Zabbix server side. Attacker can run test of SMS providing specially crafted phone number and execute additional AT commands on modem.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-22122", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63273", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63231", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63192", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63218", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.6307", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.631", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63064", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63116", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63133", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.6315", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63135", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63113", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63148", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63136", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63158", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.63172", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.6317", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00438", "scoring_system": "epss", "scoring_elements": "0.6318", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-22122" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22122", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22122" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553", "reference_id": "1078553", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-25012", "reference_id": "ZBX-25012", "reference_type": "", "scores": [ { "value": "3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T14:46:40Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-25012" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2024-22122" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3qru-uxsd-e3c8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95538?format=api", "vulnerability_id": "VCID-464s-8ex9-kqdz", "summary": "A stored XSS has been found in the Zabbix web application in the Maps element if a URL field is set with spaces before URL.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32721", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00715", "scoring_system": "epss", "scoring_elements": "0.72306", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00715", "scoring_system": "epss", "scoring_elements": "0.72324", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00715", "scoring_system": "epss", "scoring_elements": "0.72301", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00715", "scoring_system": "epss", "scoring_elements": "0.7234", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00715", "scoring_system": "epss", "scoring_elements": "0.72352", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00715", "scoring_system": "epss", "scoring_elements": "0.72375", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00715", "scoring_system": "epss", "scoring_elements": "0.72358", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00715", "scoring_system": "epss", "scoring_elements": "0.72346", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00715", "scoring_system": "epss", "scoring_elements": "0.72387", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00715", "scoring_system": "epss", "scoring_elements": "0.72397", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00715", "scoring_system": "epss", "scoring_elements": "0.72384", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00715", "scoring_system": "epss", "scoring_elements": "0.72427", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00715", "scoring_system": "epss", "scoring_elements": "0.72436", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00715", "scoring_system": "epss", "scoring_elements": "0.72432", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00715", "scoring_system": "epss", "scoring_elements": "0.72424", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00715", "scoring_system": "epss", "scoring_elements": "0.72454", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00715", "scoring_system": "epss", "scoring_elements": "0.72479", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00715", "scoring_system": "epss", "scoring_elements": "0.72442", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00715", "scoring_system": "epss", "scoring_elements": "0.72469", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00715", "scoring_system": "epss", "scoring_elements": "0.72526", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32721" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877", "reference_id": "1053877", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2023-32721" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-464s-8ex9-kqdz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95945?format=api", "vulnerability_id": "VCID-4s92-5es4-yka5", "summary": "User with no permission to any of the Hosts can access and view host count & other statistics through System Information Widget in Global View Dashboard.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-22114", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38663", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38637", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38651", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38588", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.391", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39122", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.3904", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39096", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39112", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39124", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39087", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39067", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39092", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39004", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38797", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38774", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38687", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38564", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-22114" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22114" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553", "reference_id": "1078553", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-25015", "reference_id": "ZBX-25015", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T12:39:48Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-25015" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2024-22114" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4s92-5es4-yka5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95543?format=api", "vulnerability_id": "VCID-4uxg-fxv7-rua8", "summary": "An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32727", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64506", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64302", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64459", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64428", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64453", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64331", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64287", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64335", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.6435", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64363", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64351", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64322", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64358", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64369", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.6436", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64381", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64394", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64368", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64413", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32727" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32727", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32727" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-23857", "reference_id": "ZBX-23857", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:37:31Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-23857" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2023-32727" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4uxg-fxv7-rua8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95539?format=api", "vulnerability_id": "VCID-547a-p94b-6fep", "summary": "The zabbix/src/libs/zbxjson module is vulnerable to a buffer overflow when parsing JSON files via zbx_json_open.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32722", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58079", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57972", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.5803", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.5798", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58009", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.5799", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57966", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58022", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58024", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58041", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58019", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57999", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58029", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58028", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58005", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57969", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57985", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57968", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57925", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32722" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877", "reference_id": "1053877", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-23390", "reference_id": "ZBX-23390", "reference_type": "", "scores": [ { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-18T15:26:49Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-23390" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2023-32722" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-547a-p94b-6fep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91985?format=api", "vulnerability_id": "VCID-55mr-z77t-xbhh", "summary": "SQL injection vulnerability in the get_history_lastid function in the nodewatcher component in Zabbix Server before 1.6.8 allows remote attackers to execute arbitrary SQL commands via a crafted request, possibly related to the send_history_last_id function in zabbix_server/trapper/nodehistory.c.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4499", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47559", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47598", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47619", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47568", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47623", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47618", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47642", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47627", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47685", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47677", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.4763", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.4761", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47565", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.4748", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47546", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47567", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.4751", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47539", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47613", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4499" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4499", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4499" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613", "reference_id": "562613", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2009-4499" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-55mr-z77t-xbhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92427?format=api", "vulnerability_id": "VCID-5b6p-zpce-8ygy", "summary": "libs/zbxmedia/eztexting.c in Zabbix 1.8.x before 1.8.18rc1, 2.0.x before 2.0.8rc1, and 2.1.x before 2.1.2 does not properly set the CURLOPT_SSL_VERIFYHOST option for libcurl, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6086", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41267", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.4136", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41389", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41316", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41367", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41374", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41395", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41363", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41349", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41392", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.4129", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41178", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41172", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41093", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.40954", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41027", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.41045", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.4095", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.40974", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00194", "scoring_system": "epss", "scoring_elements": "0.4105", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6086" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6086", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6086" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697443", "reference_id": "697443", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697443" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2012-6086" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5b6p-zpce-8ygy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81331?format=api", "vulnerability_id": "VCID-5dku-ycr7-2uek", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10134", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.86228", "scoring_system": "epss", "scoring_elements": "0.99397", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.86228", "scoring_system": "epss", "scoring_elements": "0.99398", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.86228", "scoring_system": "epss", "scoring_elements": "0.994", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.86228", "scoring_system": "epss", "scoring_elements": "0.99401", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.86228", "scoring_system": "epss", "scoring_elements": "0.99402", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.86228", "scoring_system": "epss", "scoring_elements": "0.99403", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.86228", "scoring_system": "epss", "scoring_elements": "0.99406", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.86228", "scoring_system": "epss", "scoring_elements": "0.99405", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.86228", "scoring_system": "epss", "scoring_elements": "0.99407", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.86228", "scoring_system": "epss", "scoring_elements": "0.99409", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.86228", "scoring_system": "epss", "scoring_elements": "0.99411", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.86228", "scoring_system": "epss", "scoring_elements": "0.99412", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10134" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10134" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936", "reference_id": "850936", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936" }, { "reference_url": "https://usn.ubuntu.com/USN-4767-1/", "reference_id": "USN-USN-4767-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4767-1/" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-11023", "reference_id": "ZBX-11023", "reference_type": "", "scores": [], "url": "https://support.zabbix.com/browse/ZBX-11023" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035771?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.7%2Bdfsg-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.7%252Bdfsg-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050323?format=api", "purl": "pkg:deb/debian/zabbix@1:3.0.7%2Bdfsg-1~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:3.0.7%252Bdfsg-1~bpo8%252B1" } ], "aliases": [ "CVE-2016-10134", "ZBX-11023" ], "risk_score": 1.6, "exploitability": "2.0", "weighted_severity": "0.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5dku-ycr7-2uek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59478?format=api", "vulnerability_id": "VCID-5krc-4z83-cufk", "summary": "Multiple vulnerabilities have been found in Zabbix, possibly\n leading to SQL injection attacks, Denial of Service, or information\n disclosure.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1364", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63156", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63215", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63244", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.6321", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63261", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63279", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63296", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.6328", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63282", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63289", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63269", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63287", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63301", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63299", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63267", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63311", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63363", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63324", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.6335", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63405", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1364" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698541", "reference_id": "698541", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698541" }, { "reference_url": "https://security.gentoo.org/glsa/201311-15", "reference_id": "GLSA-201311-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2013-1364" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5krc-4z83-cufk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90715?format=api", "vulnerability_id": "VCID-5m6q-rgu8-jyfh", "summary": "zabbix file descriptor consumption by authorized hosts", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1353.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1353.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1353", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90517", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90521", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90532", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90538", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.9055", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90556", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90565", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90564", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90558", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90576", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90575", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90574", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90588", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90584", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90597", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90615", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90627", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90624", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90633", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90647", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1353" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=437848", "reference_id": "437848", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=437848" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471678", "reference_id": "471678", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471678" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/dos/31403.txt", "reference_id": "CVE-2008-1353;OSVDB-42944", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/dos/31403.txt" }, { "reference_url": "https://www.securityfocus.com/bid/28244/info", "reference_id": "CVE-2008-1353;OSVDB-42944", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/28244/info" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035768?format=api", "purl": "pkg:deb/debian/zabbix@1:1.4.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-24sd-pp6s-e3gv" }, { "vulnerability": "VCID-2dx4-612r-afcm" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3p27-zs76-b3bg" }, { "vulnerability": "VCID-3pw5-bega-j7bg" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-55mr-z77t-xbhh" }, { "vulnerability": "VCID-5b6p-zpce-8ygy" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5krc-4z83-cufk" }, { "vulnerability": "VCID-5mpe-ycm1-wucw" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-656n-db2u-2bch" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-854s-ttw2-hqh6" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-8fe6-wr93-xybd" }, { "vulnerability": "VCID-9636-p8at-1keh" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9meu-vgne-hyg7" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9urt-8xcy-v7au" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-a26f-c8an-9ugu" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cfqn-tsfr-zbce" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dqkj-n4af-fkhx" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-fspv-5pb9-dfa5" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gj92-45q8-h3ez" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-h73t-dvgp-dbeu" }, { "vulnerability": "VCID-ju7r-4ugw-k7c7" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-nxzp-nb57-9fhx" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-x4be-du7g-kuav" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zemm-yb4a-4bc5" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.4.6-1" } ], "aliases": [ "CVE-2008-1353" ], "risk_score": 0.2, "exploitability": "2.0", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5m6q-rgu8-jyfh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59479?format=api", "vulnerability_id": "VCID-5mpe-ycm1-wucw", "summary": "Multiple vulnerabilities have been found in Zabbix, possibly\n leading to SQL injection attacks, Denial of Service, or information\n disclosure.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5572", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07821", "scoring_system": "epss", "scoring_elements": "0.91946", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07821", "scoring_system": "epss", "scoring_elements": "0.91954", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07821", "scoring_system": "epss", "scoring_elements": "0.91962", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07821", "scoring_system": "epss", "scoring_elements": "0.91968", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07821", "scoring_system": "epss", "scoring_elements": "0.91981", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07821", "scoring_system": "epss", "scoring_elements": "0.91984", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07821", "scoring_system": "epss", "scoring_elements": "0.91987", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07821", "scoring_system": "epss", "scoring_elements": "0.91986", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07821", "scoring_system": "epss", "scoring_elements": "0.91983", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07821", "scoring_system": "epss", "scoring_elements": "0.92002", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07821", "scoring_system": "epss", "scoring_elements": "0.91999", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.07821", "scoring_system": "epss", "scoring_elements": "0.91995", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.07821", "scoring_system": "epss", "scoring_elements": "0.92", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.07821", "scoring_system": "epss", "scoring_elements": "0.92008", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.07821", "scoring_system": "epss", "scoring_elements": "0.92021", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.07821", "scoring_system": "epss", "scoring_elements": "0.9203", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.07821", "scoring_system": "epss", "scoring_elements": "0.92037", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.07821", "scoring_system": "epss", "scoring_elements": "0.92054", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5572" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5572", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5572" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/36157.rb", "reference_id": "CVE-2013-5572;OSVDB-97811", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/36157.rb" }, { "reference_url": "https://security.gentoo.org/glsa/201311-15", "reference_id": "GLSA-201311-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2013-5572" ], "risk_score": 0.2, "exploitability": "2.0", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5mpe-ycm1-wucw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92598?format=api", "vulnerability_id": "VCID-5r88-rt1s-8ydf", "summary": "XML external entity (XXE) vulnerability in Zabbix 1.8.x before 1.8.21rc1, 2.0.x before 2.0.13rc1, 2.2.x before 2.2.5rc1, and 2.3.x before 2.3.2 allows remote attackers to read arbitrary files or potentially execute arbitrary code via a crafted DTD in an XML request.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3005", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04287", "scoring_system": "epss", "scoring_elements": "0.88802", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04287", "scoring_system": "epss", "scoring_elements": "0.8881", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04287", "scoring_system": "epss", "scoring_elements": "0.88826", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04287", "scoring_system": "epss", "scoring_elements": "0.88829", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04287", "scoring_system": "epss", "scoring_elements": "0.88846", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04287", "scoring_system": "epss", "scoring_elements": "0.88851", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04287", "scoring_system": "epss", "scoring_elements": "0.88863", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04287", "scoring_system": "epss", "scoring_elements": "0.88858", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04287", "scoring_system": "epss", "scoring_elements": "0.88872", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04287", "scoring_system": "epss", "scoring_elements": "0.8887", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04287", "scoring_system": "epss", "scoring_elements": "0.88867", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04287", "scoring_system": "epss", "scoring_elements": "0.88884", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04287", "scoring_system": "epss", "scoring_elements": "0.88891", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04287", "scoring_system": "epss", "scoring_elements": "0.88899", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04287", "scoring_system": "epss", "scoring_elements": "0.88916", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04287", "scoring_system": "epss", "scoring_elements": "0.88929", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04287", "scoring_system": "epss", "scoring_elements": "0.88922", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.04287", "scoring_system": "epss", "scoring_elements": "0.88932", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.04287", "scoring_system": "epss", "scoring_elements": "0.8895", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3005" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3005" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751910", "reference_id": "751910", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751910" }, { "reference_url": "https://usn.ubuntu.com/USN-4767-1/", "reference_id": "USN-USN-4767-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4767-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035770?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.7%2Bdfsg-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.7%252Bdfsg-2" } ], "aliases": [ "CVE-2014-3005" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5r88-rt1s-8ydf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95496?format=api", "vulnerability_id": "VCID-5s7j-6aea-qucr", "summary": "Stored or persistent cross-site scripting (XSS) is a type of XSS where the attacker first sends the payload to the web application, then the application saves the payload (e.g., in a database or server-side text files), and finally, the application unintentionally executes the payload for every victim visiting its web pages.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29454", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70673", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70654", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74208", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.7417", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74217", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74209", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74244", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74253", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74251", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74245", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74273", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74126", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74159", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74174", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74195", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00807", "scoring_system": "epss", "scoring_elements": "0.74177", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00815", "scoring_system": "epss", "scoring_elements": "0.74378", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00815", "scoring_system": "epss", "scoring_elements": "0.74456", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00815", "scoring_system": "epss", "scoring_elements": "0.744", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00815", "scoring_system": "epss", "scoring_elements": "0.74412", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29454" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29454", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29454" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175", "reference_id": "1055175", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-22985", "reference_id": "ZBX-22985", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T21:06:47Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-22985" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2023-29454" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5s7j-6aea-qucr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59475?format=api", "vulnerability_id": "VCID-656n-db2u-2bch", "summary": "Multiple vulnerabilities have been found in Zabbix, possibly\n leading to SQL injection attacks, Denial of Service, or information\n disclosure.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3263", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64802", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64852", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64879", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64842", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64892", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64907", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64924", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64914", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64886", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64923", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64933", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64917", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64936", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64949", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64945", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64926", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64974", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.65016", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.64985", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.65007", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00476", "scoring_system": "epss", "scoring_elements": "0.65063", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3263" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3263", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3263" }, { "reference_url": "https://security.gentoo.org/glsa/201311-15", "reference_id": "GLSA-201311-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2011-3263" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-656n-db2u-2bch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95497?format=api", "vulnerability_id": "VCID-673b-qsd3-e3hz", "summary": "Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script is activated through a link, which sends a request to a website with a vulnerability that enables execution of malicious scripts.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29455", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75899", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00917", "scoring_system": "epss", "scoring_elements": "0.75866", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01219", "scoring_system": "epss", "scoring_elements": "0.79058", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01219", "scoring_system": "epss", "scoring_elements": "0.79082", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01219", "scoring_system": "epss", "scoring_elements": "0.79081", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01219", "scoring_system": "epss", "scoring_elements": "0.79114", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01219", "scoring_system": "epss", "scoring_elements": "0.79121", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01219", "scoring_system": "epss", "scoring_elements": "0.79136", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01219", "scoring_system": "epss", "scoring_elements": "0.79149", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01219", "scoring_system": "epss", "scoring_elements": "0.7917", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01219", "scoring_system": "epss", "scoring_elements": "0.79028", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01219", "scoring_system": "epss", "scoring_elements": "0.79052", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01219", "scoring_system": "epss", "scoring_elements": "0.79059", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01219", "scoring_system": "epss", "scoring_elements": "0.79083", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01219", "scoring_system": "epss", "scoring_elements": "0.79068", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01219", "scoring_system": "epss", "scoring_elements": "0.79085", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01231", "scoring_system": "epss", "scoring_elements": "0.79301", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01231", "scoring_system": "epss", "scoring_elements": "0.79319", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01231", "scoring_system": "epss", "scoring_elements": "0.79359", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29455" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29455" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175", "reference_id": "1055175", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-22986", "reference_id": "ZBX-22986", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T21:06:45Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-22986" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2023-29455" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-673b-qsd3-e3hz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96579?format=api", "vulnerability_id": "VCID-69kr-fmzb-nbdr", "summary": "Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27234", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25637", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25868", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26987", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.2694", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.2693", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26983", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27028", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27031", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.2776", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30229", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30137", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30159", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30678", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30644", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30467", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30353", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30271", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.3013", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.302", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30209", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27234" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27234", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27234" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-26985", "reference_id": "ZBX-26985", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-12T15:16:38Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-26985" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" } ], "aliases": [ "CVE-2025-27234" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-69kr-fmzb-nbdr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95493?format=api", "vulnerability_id": "VCID-6u3x-x7qt-g3fa", "summary": "JavaScript preprocessing, webhooks and global scripts can cause uncontrolled CPU, memory, and disk I/O utilization. Preprocessing/webhook/global script configuration and testing are only available to Administrative roles (Admin and Superadmin). Administrative privileges should be typically granted to users who need to perform tasks that require more control over the system. The security risk is limited because not all users have this level of access.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29449", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73212", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73191", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75198", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75155", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75136", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75145", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.7498", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75014", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75026", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75047", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75015", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75051", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75059", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75049", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75087", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75092", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75096", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75103", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.7513", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29449" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29449", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29449" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175", "reference_id": "1055175", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-22589", "reference_id": "ZBX-22589", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:25:49Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-22589" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2023-29449" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6u3x-x7qt-g3fa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96118?format=api", "vulnerability_id": "VCID-7bzf-3c9x-8qc4", "summary": "An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36467", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47366", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47425", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47339", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.4736", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47308", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47363", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47384", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47359", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55621", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55574", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55634", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55678", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55729", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55708", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55633", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.5565", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55627", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69898", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00608", "scoring_system": "epss", "scoring_elements": "0.69848", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36467" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36467", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36467" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689", "reference_id": "1088689", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-25614", "reference_id": "ZBX-25614", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-04T04:55:25Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-25614" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2024-36467" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7bzf-3c9x-8qc4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96179?format=api", "vulnerability_id": "VCID-7f3g-hebk-3qad", "summary": "In the src/libs/zbxembed/browser.c file, the es_browser_ctor method retrieves a heap pointer from the Duktape JavaScript engine. This heap pointer is subsequently utilized by the browser_push_error method in the src/libs/zbxembed/browser_error.c file. A use-after-free bug can occur at this stage if the wd->browser heap pointer is freed by garbage collection.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-42331", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13832", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13707", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13702", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13735", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13822", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13878", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13679", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13762", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13812", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13781", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13744", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13694", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13605", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13602", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13676", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13685", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13655", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13557", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13466", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13622", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-42331" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42331", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42331" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689", "reference_id": "1088689", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-25627", "reference_id": "ZBX-25627", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:55:25Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-25627" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2024-42331" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7f3g-hebk-3qad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96116?format=api", "vulnerability_id": "VCID-7yp1-231f-a3eq", "summary": "The implementation of atob in \"Zabbix JS\" allows to create a string with arbitrary content and use it to access internal properties of objects.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36463", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59457", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.594", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59358", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59385", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59297", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59321", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59286", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59336", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59349", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59368", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59352", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59334", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59367", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59373", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59354", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59332", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59351", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59294", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59343", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36463" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36463", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36463" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-25611", "reference_id": "ZBX-25611", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-26T16:21:34Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-25611" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2024-36463" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7yp1-231f-a3eq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91984?format=api", "vulnerability_id": "VCID-854s-ttw2-hqh6", "summary": "The node_process_command function in Zabbix Server before 1.8 allows remote attackers to execute arbitrary commands via a crafted request.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4498", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.71776", "scoring_system": "epss", "scoring_elements": "0.98726", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.71776", "scoring_system": "epss", "scoring_elements": "0.98727", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.71776", "scoring_system": "epss", "scoring_elements": "0.9873", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.71776", "scoring_system": "epss", "scoring_elements": "0.98733", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.71776", "scoring_system": "epss", "scoring_elements": "0.98734", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.71776", "scoring_system": "epss", "scoring_elements": "0.98736", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.71776", "scoring_system": "epss", "scoring_elements": "0.98737", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.71776", "scoring_system": "epss", "scoring_elements": "0.9874", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.71776", "scoring_system": "epss", "scoring_elements": "0.98741", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.71776", "scoring_system": "epss", "scoring_elements": "0.98745", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.71776", "scoring_system": "epss", "scoring_elements": "0.98747", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.71776", "scoring_system": "epss", "scoring_elements": "0.98752", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.71776", "scoring_system": "epss", "scoring_elements": "0.98753", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.71776", "scoring_system": "epss", "scoring_elements": "0.98755", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.71776", "scoring_system": "epss", "scoring_elements": "0.98756", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.71776", "scoring_system": "epss", "scoring_elements": "0.98758", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.71776", "scoring_system": "epss", "scoring_elements": "0.9876", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4498" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4498", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4498" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613", "reference_id": "562613", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/20796.rb", "reference_id": "CVE-2009-4498;OSVDB-60965", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/20796.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/10432.txt", "reference_id": "CVE-2009-4501;CVE-2009-4499;CVE-2009-4498;OSVDB-60968;OSVDB-60966;OSVDB-60965", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/10432.txt" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2009-4498" ], "risk_score": 1.2, "exploitability": "2.0", "weighted_severity": "0.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-854s-ttw2-hqh6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95199?format=api", "vulnerability_id": "VCID-8cpy-mqfn-y3f9", "summary": "An authenticated user can create a link with reflected Javascript code inside it for the graphs page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35230", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00874", "scoring_system": "epss", "scoring_elements": "0.75454", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00874", "scoring_system": "epss", "scoring_elements": "0.75221", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00874", "scoring_system": "epss", "scoring_elements": "0.75251", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00874", "scoring_system": "epss", "scoring_elements": "0.75229", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00874", "scoring_system": "epss", "scoring_elements": "0.75271", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00874", "scoring_system": "epss", "scoring_elements": "0.75282", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00874", "scoring_system": "epss", "scoring_elements": "0.75302", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00874", "scoring_system": "epss", "scoring_elements": "0.7528", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00874", "scoring_system": "epss", "scoring_elements": "0.75269", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00874", "scoring_system": "epss", "scoring_elements": "0.75308", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00874", "scoring_system": "epss", "scoring_elements": "0.75315", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00874", "scoring_system": "epss", "scoring_elements": "0.75306", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00874", "scoring_system": "epss", "scoring_elements": "0.75342", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00874", "scoring_system": "epss", "scoring_elements": "0.75346", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00874", "scoring_system": "epss", "scoring_elements": "0.75349", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00874", "scoring_system": "epss", "scoring_elements": "0.75357", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00874", "scoring_system": "epss", "scoring_elements": "0.75386", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00874", "scoring_system": "epss", "scoring_elements": "0.75411", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00874", "scoring_system": "epss", "scoring_elements": "0.7539", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00874", "scoring_system": "epss", "scoring_elements": "0.75398", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35230" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35230", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35230" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014994", "reference_id": "1014994", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014994" }, { "reference_url": "https://usn.ubuntu.com/6751-1/", "reference_id": "USN-6751-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6751-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" } ], "aliases": [ "CVE-2022-35230" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8cpy-mqfn-y3f9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49832?format=api", "vulnerability_id": "VCID-8fe6-wr93-xybd", "summary": "A vulnerability in Zabbix could allow remote attackers to execute\n arbitrary shell code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6824", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.80859", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.80867", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.8089", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.80887", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.80915", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.80924", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.8094", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.80926", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.80917", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.80952", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.80954", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.80955", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.80976", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.80983", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.80995", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.81008", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.81031", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.81053", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.81048", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.81066", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01469", "scoring_system": "epss", "scoring_elements": "0.81108", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6824" }, { "reference_url": "https://security.gentoo.org/glsa/201401-26", "reference_id": "GLSA-201401-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2013-6824" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8fe6-wr93-xybd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59473?format=api", "vulnerability_id": "VCID-9636-p8at-1keh", "summary": "Multiple vulnerabilities have been found in Zabbix, possibly\n leading to SQL injection attacks, Denial of Service, or information\n disclosure.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1277", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01516", "scoring_system": "epss", "scoring_elements": "0.81161", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01516", "scoring_system": "epss", "scoring_elements": "0.81169", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01516", "scoring_system": "epss", "scoring_elements": "0.81193", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01516", "scoring_system": "epss", "scoring_elements": "0.8122", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01516", "scoring_system": "epss", "scoring_elements": "0.81226", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01516", "scoring_system": "epss", "scoring_elements": "0.81246", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01516", "scoring_system": "epss", "scoring_elements": "0.81232", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01516", "scoring_system": "epss", "scoring_elements": "0.81225", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01516", "scoring_system": "epss", "scoring_elements": "0.81262", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01516", "scoring_system": "epss", "scoring_elements": "0.81263", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01516", "scoring_system": "epss", "scoring_elements": "0.81284", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01516", "scoring_system": "epss", "scoring_elements": "0.81292", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01516", "scoring_system": "epss", "scoring_elements": "0.81298", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01516", "scoring_system": "epss", "scoring_elements": "0.81313", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01516", "scoring_system": "epss", "scoring_elements": "0.81332", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01516", "scoring_system": "epss", "scoring_elements": "0.81354", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01516", "scoring_system": "epss", "scoring_elements": "0.8135", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01516", "scoring_system": "epss", "scoring_elements": "0.81367", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01516", "scoring_system": "epss", "scoring_elements": "0.81409", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1277" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577058", "reference_id": "577058", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577058" }, { "reference_url": "https://security.gentoo.org/glsa/201311-15", "reference_id": "GLSA-201311-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2010-1277" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9636-p8at-1keh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95198?format=api", "vulnerability_id": "VCID-9aju-xvg1-n7e5", "summary": "An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35229", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74365", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74152", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74179", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74151", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74184", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74199", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.7422", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74203", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74196", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74233", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74243", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74234", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74269", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74278", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74277", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74271", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74298", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74322", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74285", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74308", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35229" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35229", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35229" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014992", "reference_id": "1014992", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014992" }, { "reference_url": "https://usn.ubuntu.com/6751-1/", "reference_id": "USN-6751-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6751-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" } ], "aliases": [ "CVE-2022-35229" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9aju-xvg1-n7e5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91987?format=api", "vulnerability_id": "VCID-9meu-vgne-hyg7", "summary": "The zbx_get_next_field function in libs/zbxcommon/str.c in Zabbix Server before 1.6.8 allows remote attackers to cause a denial of service (crash) via a request that lacks expected separators, which triggers a NULL pointer dereference, as demonstrated using the Command keyword.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4501", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89154", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89161", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89176", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89178", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89197", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89201", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89211", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89207", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89205", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89218", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89217", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89213", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89231", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89236", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89239", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89248", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89264", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89276", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89273", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89284", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.04567", "scoring_system": "epss", "scoring_elements": "0.89304", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4501" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4501", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4501" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613", "reference_id": "562613", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2009-4501" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9meu-vgne-hyg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94043?format=api", "vulnerability_id": "VCID-9t49-tzah-zkhb", "summary": "Zabbix through 4.4.0alpha1 allows User Enumeration. With login requests, it is possible to enumerate application usernames based on the variability of server responses (e.g., the \"Login name or password is incorrect\" and \"No permissions for system access\" messages, or just blocking for a number of seconds). This affects both api_jsonrpc.php and index.php.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15132", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61337", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61413", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61441", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61412", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61459", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61475", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61496", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00412", "scoring_system": "epss", "scoring_elements": "0.61483", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00462", "scoring_system": "epss", "scoring_elements": "0.64186", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66923", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66938", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66921", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66944", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66958", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66956", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66927", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66969", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.67008", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66981", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.67004", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.67069", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15132" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935027", "reference_id": "935027", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935027" }, { "reference_url": "https://usn.ubuntu.com/USN-4767-1/", "reference_id": "USN-USN-4767-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4767-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995115?format=api", "purl": "pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1" } ], "aliases": [ "CVE-2019-15132" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9t49-tzah-zkhb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92506?format=api", "vulnerability_id": "VCID-9urt-8xcy-v7au", "summary": "A File Inclusion vulnerability exists in Zabbix 2.0.6 due to inadequate sanitization of request strings in CGI scripts, which could let a remote malicious user execute arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3738", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02855", "scoring_system": "epss", "scoring_elements": "0.86175", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02855", "scoring_system": "epss", "scoring_elements": "0.86185", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02855", "scoring_system": "epss", "scoring_elements": "0.86198", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02855", "scoring_system": "epss", "scoring_elements": "0.86199", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02855", "scoring_system": "epss", "scoring_elements": "0.86218", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02855", "scoring_system": "epss", "scoring_elements": "0.86229", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02855", "scoring_system": "epss", "scoring_elements": "0.86243", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02855", "scoring_system": "epss", "scoring_elements": "0.86241", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02855", "scoring_system": "epss", "scoring_elements": "0.86237", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02855", "scoring_system": "epss", "scoring_elements": "0.86254", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02855", "scoring_system": "epss", "scoring_elements": "0.86259", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02855", "scoring_system": "epss", "scoring_elements": "0.86252", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.09146", "scoring_system": "epss", "scoring_elements": "0.92702", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.09146", "scoring_system": "epss", "scoring_elements": "0.92698", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.09146", "scoring_system": "epss", "scoring_elements": "0.92707", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.09146", "scoring_system": "epss", "scoring_elements": "0.9272", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.09146", "scoring_system": "epss", "scoring_elements": "0.92731", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.09146", "scoring_system": "epss", "scoring_elements": "0.92735", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.09146", "scoring_system": "epss", "scoring_elements": "0.92741", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.09146", "scoring_system": "epss", "scoring_elements": "0.92764", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3738" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2013-3738" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9urt-8xcy-v7au" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95541?format=api", "vulnerability_id": "VCID-9z8h-gg7t-b7f8", "summary": "Memory pointer is in a property of the Ducktape object. This leads to multiple vulnerabilities related to direct memory access and manipulation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32724", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72648", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72594", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72428", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72446", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72422", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72461", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72474", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72496", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72478", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72469", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.7251", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72519", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72509", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72552", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72559", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72557", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.7255", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72579", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72605", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72567", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32724" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877", "reference_id": "1053877", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-23391", "reference_id": "ZBX-23391", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:43:17Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-23391" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2023-32724" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9z8h-gg7t-b7f8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92047?format=api", "vulnerability_id": "VCID-a26f-c8an-9ugu", "summary": "Multiple cross-site scripting (XSS) vulnerabilities in the formatQuery function in frontends/php/include/classes/class.curl.php in Zabbix before 1.8.3rc1 allow remote attackers to inject arbitrary web script or HTML via the (1) filter_set, (2) show_details, (3) filter_rst, or (4) txt_select parameters to the triggers page (tr_status.php). NOTE: some of these details are obtained from third party information.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2790", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63425", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63177", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63236", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63265", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.6323", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63282", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63299", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63317", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.633", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63264", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63301", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63308", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63288", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63307", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.6332", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63318", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63286", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63331", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63383", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.63344", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00442", "scoring_system": "epss", "scoring_elements": "0.6337", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2790" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2790", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2790" }, { "reference_url": "http://secunia.com/advisories/40679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40679" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60772", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60772" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-2326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.zabbix.com/browse/ZBX-2326" }, { "reference_url": "http://www.securityfocus.com/bid/42017", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/42017" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1908", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1908" }, { "reference_url": "http://www.zabbix.com/forum/showthread.php?p=68770", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zabbix.com/forum/showthread.php?p=68770" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594304", "reference_id": "594304", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594304" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2790", "reference_id": "CVE-2010-2790", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2790" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2010-2790" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a26f-c8an-9ugu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96178?format=api", "vulnerability_id": "VCID-aetr-jrab-6fg5", "summary": "The HttpRequest object allows to get the HTTP headers from the server's response after sending the request. The problem is that the returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScript. This allows to create internal strings that can be used to access hidden properties of objects.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-42330", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38183", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38205", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38159", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38249", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38272", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38141", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38191", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38199", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0017", "scoring_system": "epss", "scoring_elements": "0.38218", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45733", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45693", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45636", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45662", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45892", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45838", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45764", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45775", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45716", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45612", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45674", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-42330" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42330" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689", "reference_id": "1088689", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-25626", "reference_id": "ZBX-25626", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:12:32Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-25626" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2024-42330" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aetr-jrab-6fg5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49461?format=api", "vulnerability_id": "VCID-b648-nvxx-hfft", "summary": "Multiple vulnerabilities have been found in Zabbix, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4338", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.4496", "scoring_system": "epss", "scoring_elements": "0.97565", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.4496", "scoring_system": "epss", "scoring_elements": "0.97571", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.4496", "scoring_system": "epss", "scoring_elements": "0.97574", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.4496", "scoring_system": "epss", "scoring_elements": "0.97575", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.4496", "scoring_system": "epss", "scoring_elements": "0.97581", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.4496", "scoring_system": "epss", "scoring_elements": "0.97583", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.4496", "scoring_system": "epss", "scoring_elements": "0.97586", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.4496", "scoring_system": "epss", "scoring_elements": "0.97588", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.4496", "scoring_system": "epss", "scoring_elements": "0.97596", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.4496", "scoring_system": "epss", "scoring_elements": "0.97597", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.4496", "scoring_system": "epss", "scoring_elements": "0.97595", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.4496", "scoring_system": "epss", "scoring_elements": "0.976", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.4496", "scoring_system": "epss", "scoring_elements": "0.97607", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.4496", "scoring_system": "epss", "scoring_elements": "0.97612", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.4496", "scoring_system": "epss", "scoring_elements": "0.97614", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.4496", "scoring_system": "epss", "scoring_elements": "0.9762", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.4496", "scoring_system": "epss", "scoring_elements": "0.97629", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4338" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823329", "reference_id": "823329", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823329" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/39769.txt", "reference_id": "CVE-2016-4338", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/39769.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201612-42", "reference_id": "GLSA-201612-42", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-42" }, { "reference_url": "https://usn.ubuntu.com/USN-4767-1/", "reference_id": "USN-USN-4767-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4767-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050323?format=api", "purl": "pkg:deb/debian/zabbix@1:3.0.7%2Bdfsg-1~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:3.0.7%252Bdfsg-1~bpo8%252B1" } ], "aliases": [ "CVE-2016-4338" ], "risk_score": 0.8, "exploitability": "2.0", "weighted_severity": "0.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b648-nvxx-hfft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96117?format=api", "vulnerability_id": "VCID-b8tm-2187-wkhz", "summary": "When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be expected to have access to these passwords.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36464", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15318", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15167", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15252", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15385", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15455", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15258", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15346", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15396", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15356", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20641", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20567", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20544", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20558", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20672", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20663", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2055", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20547", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20515", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20408", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20479", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36464" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36464", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36464" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1090030", "reference_id": "1090030", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1090030" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-25630", "reference_id": "ZBX-25630", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:27:15Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-25630" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2024-36464" ], "risk_score": 0.7, "exploitability": "0.5", "weighted_severity": "1.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b8tm-2187-wkhz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95950?format=api", "vulnerability_id": "VCID-batr-txtv-s3cf", "summary": "Setting SMS media allows to set GSM modem file. Later this file is used as Linux device. But due everything is a file for Linux, it is possible to set another file, e.g. log file and zabbix_server will try to communicate with it as modem. As a result, log file will be broken with AT commands and small part for log file content will be leaked to UI.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-22123", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60932", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60847", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60852", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60826", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60886", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60848", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60874", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60757", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60786", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60751", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60799", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60815", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60836", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60823", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60804", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61534", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61485", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61539", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-22123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22123" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553", "reference_id": "1078553", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-25013", "reference_id": "ZBX-25013", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T14:40:56Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-25013" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2024-22123" ], "risk_score": 0.7, "exploitability": "0.5", "weighted_severity": "1.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-batr-txtv-s3cf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85432?format=api", "vulnerability_id": "VCID-c2w8-zs9u-z7a9", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2824", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.73548", "scoring_system": "epss", "scoring_elements": "0.98794", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.73548", "scoring_system": "epss", "scoring_elements": "0.98795", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.73548", "scoring_system": "epss", "scoring_elements": "0.98798", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.73548", "scoring_system": "epss", "scoring_elements": "0.98801", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.73548", "scoring_system": "epss", "scoring_elements": "0.98802", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.73548", "scoring_system": "epss", "scoring_elements": "0.98804", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.73548", "scoring_system": "epss", "scoring_elements": "0.98805", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.73548", "scoring_system": "epss", "scoring_elements": "0.98806", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.73548", "scoring_system": "epss", "scoring_elements": "0.9881", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.73548", "scoring_system": "epss", "scoring_elements": "0.98811", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.73548", "scoring_system": "epss", "scoring_elements": "0.98814", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.73548", "scoring_system": "epss", "scoring_elements": "0.98817", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.73548", "scoring_system": "epss", "scoring_elements": "0.98818", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.73548", "scoring_system": "epss", "scoring_elements": "0.98822", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.73548", "scoring_system": "epss", "scoring_elements": "0.98823", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.73548", "scoring_system": "epss", "scoring_elements": "0.98826", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.73548", "scoring_system": "epss", "scoring_elements": "0.98827", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.73548", "scoring_system": "epss", "scoring_elements": "0.98829", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.73548", "scoring_system": "epss", "scoring_elements": "0.98832", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2825" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863584", "reference_id": "863584", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863584" }, { "reference_url": "https://usn.ubuntu.com/USN-4767-1/", "reference_id": "USN-USN-4767-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4767-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035771?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.7%2Bdfsg-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.7%252Bdfsg-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050324?format=api", "purl": "pkg:deb/debian/zabbix@1:3.0.7%2Bdfsg-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:3.0.7%252Bdfsg-3" } ], "aliases": [ "CVE-2017-2824" ], "risk_score": 0.3, "exploitability": "0.5", "weighted_severity": "0.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c2w8-zs9u-z7a9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92652?format=api", "vulnerability_id": "VCID-cbnd-ytgt-dycn", "summary": "Multiple SQL injection vulnerabilities in chart_bar.php in the frontend in Zabbix before 1.8.22, 2.0.x before 2.0.14, and 2.2.x before 2.2.8 allow remote attackers to execute arbitrary SQL commands via the (1) itemid or (2) periods parameter.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9450", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64141", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.63887", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.63946", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.63974", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.63933", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.63984", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64001", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64013", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.63999", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.63969", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64004", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64016", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64005", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64024", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64036", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64034", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64048", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64094", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64061", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64087", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9450" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9450" }, { "reference_url": "http://secunia.com/advisories/61554", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61554" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-8582", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.zabbix.com/browse/ZBX-8582" }, { "reference_url": "http://www.zabbix.com/rn1.8.22.php", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zabbix.com/rn1.8.22.php" }, { "reference_url": "http://www.zabbix.com/rn2.0.14.php", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zabbix.com/rn2.0.14.php" }, { "reference_url": "http://www.zabbix.com/rn2.2.8.php", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zabbix.com/rn2.2.8.php" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774750", "reference_id": "774750", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774750" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.10:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.10:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.10:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.11:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.11:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.11:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.11:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.11:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.11:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.12:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.12:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.12:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.13:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.13:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.13:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.2:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.2:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.2:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.2:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.2:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.2:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.3:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.3:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.3:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.3:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.3:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.3:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.4:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.4:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.4:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.5:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.5:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.5:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.6:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.6:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.6:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.7:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.7:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.7:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.8:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.8:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.8:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.8:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.8:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.8:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.9:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.9:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.9:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.9:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.9:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.9:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.1:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.1:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.1:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.2:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.2:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.2:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.3:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.3:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.3:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.3:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.3:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.3:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.4:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.4:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.4:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.4:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.5:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.5:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.5:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.6:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.6:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.6:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.7:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.7:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.7:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.7:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.2.7:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.7:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9450", "reference_id": "CVE-2014-9450", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9450" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035770?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.7%2Bdfsg-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.7%252Bdfsg-2" } ], "aliases": [ "CVE-2014-9450" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cbnd-ytgt-dycn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92524?format=api", "vulnerability_id": "VCID-cfqn-tsfr-zbce", "summary": "Multiple SQL injection vulnerabilities in Zabbix 1.8.x before 1.8.18rc1, 2.0.x before 2.0.9rc1, and 2.1.x before 2.1.7.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5743", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.77788", "scoring_system": "epss", "scoring_elements": "0.98993", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.77788", "scoring_system": "epss", "scoring_elements": "0.98995", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.77788", "scoring_system": "epss", "scoring_elements": "0.98997", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.77788", "scoring_system": "epss", "scoring_elements": "0.98999", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.77788", "scoring_system": "epss", "scoring_elements": "0.99", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.77788", "scoring_system": "epss", "scoring_elements": "0.99001", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.77788", "scoring_system": "epss", "scoring_elements": "0.99002", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.77788", "scoring_system": "epss", "scoring_elements": "0.99003", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.77788", "scoring_system": "epss", "scoring_elements": "0.99005", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.77788", "scoring_system": "epss", "scoring_elements": "0.99008", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.77788", "scoring_system": "epss", "scoring_elements": "0.9901", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.77788", "scoring_system": "epss", "scoring_elements": "0.99012", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.77788", "scoring_system": "epss", "scoring_elements": "0.99016", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.77788", "scoring_system": "epss", "scoring_elements": "0.99017", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.77788", "scoring_system": "epss", "scoring_elements": "0.99018", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.77788", "scoring_system": "epss", "scoring_elements": "0.99019", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.77788", "scoring_system": "epss", "scoring_elements": "0.9902", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.77788", "scoring_system": "epss", "scoring_elements": "0.99021", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5743" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/webapps/28972.rb", "reference_id": "CVE-2013-5743;OSVDB-98115", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/webapps/28972.rb" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2013-5743" ], "risk_score": 1.4, "exploitability": "2.0", "weighted_severity": "0.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cfqn-tsfr-zbce" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95500?format=api", "vulnerability_id": "VCID-cuqx-wxkd-nffa", "summary": "Duktape is an 3rd-party embeddable JavaScript engine, with a focus on portability and compact footprint. When adding too many values in valstack JavaScript will crash. This issue occurs due to bug in Duktape 2.6 which is an 3rd-party solution that we use.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29458", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28309", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28265", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32229", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32199", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32038", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.3191", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.3183", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.31681", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.31755", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32206", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32254", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32284", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32285", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32247", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32216", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32249", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33193", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33104", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33131", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33211", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29458" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29458", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29458" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175", "reference_id": "1055175", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-22989", "reference_id": "ZBX-22989", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:19:37Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-22989" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2023-29458" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cuqx-wxkd-nffa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90700?format=api", "vulnerability_id": "VCID-d5vt-7eg9-nyha", "summary": "zabbix: root", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6210.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6210.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6210", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34877", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35074", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35102", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34981", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35026", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35055", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35059", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35023", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35039", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35024", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34977", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34747", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34728", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34638", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34508", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3458", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34618", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34515", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34541", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3461", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6210" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6210", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6210" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=407181", "reference_id": "407181", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=407181" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452682", "reference_id": "452682", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452682" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/30839.c", "reference_id": "CVE-2007-6210;OSVDB-42480", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/30839.c" }, { "reference_url": "https://www.securityfocus.com/bid/26680/info", "reference_id": "CVE-2007-6210;OSVDB-42480", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/26680/info" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035768?format=api", "purl": "pkg:deb/debian/zabbix@1:1.4.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-24sd-pp6s-e3gv" }, { "vulnerability": "VCID-2dx4-612r-afcm" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3p27-zs76-b3bg" }, { "vulnerability": "VCID-3pw5-bega-j7bg" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-55mr-z77t-xbhh" }, { "vulnerability": "VCID-5b6p-zpce-8ygy" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5krc-4z83-cufk" }, { "vulnerability": "VCID-5mpe-ycm1-wucw" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-656n-db2u-2bch" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-854s-ttw2-hqh6" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-8fe6-wr93-xybd" }, { "vulnerability": "VCID-9636-p8at-1keh" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9meu-vgne-hyg7" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9urt-8xcy-v7au" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-a26f-c8an-9ugu" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cfqn-tsfr-zbce" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dqkj-n4af-fkhx" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-fspv-5pb9-dfa5" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gj92-45q8-h3ez" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-h73t-dvgp-dbeu" }, { "vulnerability": "VCID-ju7r-4ugw-k7c7" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-nxzp-nb57-9fhx" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-x4be-du7g-kuav" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zemm-yb4a-4bc5" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.4.6-1" } ], "aliases": [ "CVE-2007-6210" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d5vt-7eg9-nyha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95542?format=api", "vulnerability_id": "VCID-d7uk-h423-77f5", "summary": "The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32726", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32521", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33077", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33109", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.3294", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32985", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33016", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33019", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32981", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32956", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32998", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32976", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32939", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32792", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32679", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32596", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32456", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.3252", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.3253", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32433", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32454", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32726" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32726", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32726" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2023-32726" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d7uk-h423-77f5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92572?format=api", "vulnerability_id": "VCID-dqkj-n4af-fkhx", "summary": "The Frontend in Zabbix before 1.8.20rc2, 2.0.x before 2.0.11rc2, and 2.2.x before 2.2.2rc1 allows remote \"Zabbix Admin\" users to modify the media of arbitrary users via unspecified vectors.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1685", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60198", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60274", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.603", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60268", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60318", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60332", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60353", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.6034", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60321", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60361", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.6037", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60359", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.6033", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60345", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60333", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60291", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60338", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60396", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60354", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60381", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.6044", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1685" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1685", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1685" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2014-1685" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dqkj-n4af-fkhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92558?format=api", "vulnerability_id": "VCID-f837-pma5-jyha", "summary": "Zabbix before 5.0 represents passwords in the users table with unsalted MD5.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7484", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43531", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43647", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43704", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43728", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43663", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43713", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43716", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43736", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43687", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43749", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43739", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43672", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.4361", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43613", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43532", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43403", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43478", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43497", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43434", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43466", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7484" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995115?format=api", "purl": "pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1" } ], "aliases": [ "CVE-2013-7484" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f837-pma5-jyha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59476?format=api", "vulnerability_id": "VCID-fspv-5pb9-dfa5", "summary": "Multiple vulnerabilities have been found in Zabbix, possibly\n leading to SQL injection attacks, Denial of Service, or information\n disclosure.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4674", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.5795", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58035", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58057", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58032", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58087", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58091", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58107", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58083", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58063", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58094", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58095", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58071", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58037", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58051", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58036", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.57994", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58097", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58049", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58079", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58148", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4674" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=651225", "reference_id": "651225", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=651225" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/18155.txt", "reference_id": "CVE-2011-4674;OSVDB-77509", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/18155.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201311-15", "reference_id": "GLSA-201311-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2011-4674" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fspv-5pb9-dfa5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95499?format=api", "vulnerability_id": "VCID-ftt2-5jnt-9ye2", "summary": "Reflected XSS attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script can be activated through Action form fields, which can be sent as request to a website with a vulnerability that enables execution of malicious scripts.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29457", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58661", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.5864", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65592", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65616", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65617", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65516", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65569", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65581", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.656", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65586", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65558", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65594", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65607", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65606", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65591", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65641", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65922", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65877", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65848", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00495", "scoring_system": "epss", "scoring_elements": "0.65867", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29457" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29457", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29457" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175", "reference_id": "1055175", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-22988", "reference_id": "ZBX-22988", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T21:06:43Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-22988" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2023-29457" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ftt2-5jnt-9ye2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95075?format=api", "vulnerability_id": "VCID-gbn9-b2t2-5fbs", "summary": "During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23132", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.3386", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34448", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34477", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34343", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34386", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34415", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34418", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34379", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34355", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34389", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34375", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34335", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.33962", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.33943", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.33859", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.33739", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.33808", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.33849", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.33761", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.33784", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23132" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" } ], "aliases": [ "CVE-2022-23132" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gbn9-b2t2-5fbs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92111?format=api", "vulnerability_id": "VCID-gj92-45q8-h3ez", "summary": "SQL injection vulnerability in events.php in Zabbix 1.8.1 and earlier allows remote attackers to execute arbitrary SQL commands via the nav_time parameter.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-5049", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65328", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65376", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65402", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65366", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65419", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.6543", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65448", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65435", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65407", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65444", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65454", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.6544", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65456", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65468", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65465", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65445", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65491", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65535", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65505", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65526", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65582", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-5049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5049" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2010-5049" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gj92-45q8-h3ez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96114?format=api", "vulnerability_id": "VCID-gp3f-yz9h-eqax", "summary": "The front-end audit log allows viewing of unprotected plaintext passwords, where the passwords are displayed in plain text.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36460", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63621", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63579", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63544", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.6357", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63426", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63453", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63418", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.6347", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63487", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63504", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63488", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63454", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63495", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.6348", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63499", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63513", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63508", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63482", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63527", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36460" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36460", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36460" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553", "reference_id": "1078553", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-25017", "reference_id": "ZBX-25017", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:04:09Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-25017" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2024-36460" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gp3f-yz9h-eqax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92237?format=api", "vulnerability_id": "VCID-h73t-dvgp-dbeu", "summary": "Multiple cross-site scripting (XSS) vulnerabilities in Zabbix before 1.8.10 allow remote attackers to inject arbitrary web script or HTML via the gname parameter (aka host groups name) to (1) hostgroups.php and (2) usergrps.php, the update action to (3) hosts.php and (4) scripts.php, and (5) maintenance.php.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4615", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67729", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67762", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67782", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67813", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67828", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67851", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67838", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67801", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67837", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.6785", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67831", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.6786", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67865", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.6784", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67883", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67923", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67892", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67917", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00545", "scoring_system": "epss", "scoring_elements": "0.67973", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4615" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652664", "reference_id": "652664", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652664" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2011-4615" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h73t-dvgp-dbeu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59477?format=api", "vulnerability_id": "VCID-ju7r-4ugw-k7c7", "summary": "Multiple vulnerabilities have been found in Zabbix, possibly\n leading to SQL injection attacks, Denial of Service, or information\n disclosure.", "references": [ { "reference_url": "http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54" }, { "reference_url": "http://osvdb.org/84127", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/84127" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3435", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01799", "scoring_system": "epss", "scoring_elements": "0.82972", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01799", "scoring_system": "epss", "scoring_elements": "0.82824", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01799", "scoring_system": "epss", "scoring_elements": "0.82847", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01799", "scoring_system": "epss", "scoring_elements": "0.82856", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01799", "scoring_system": "epss", "scoring_elements": "0.82861", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01799", "scoring_system": "epss", "scoring_elements": "0.8288", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01799", "scoring_system": "epss", "scoring_elements": "0.82901", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01799", "scoring_system": "epss", "scoring_elements": "0.82922", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01799", "scoring_system": "epss", "scoring_elements": "0.8292", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01799", "scoring_system": "epss", "scoring_elements": "0.82935", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01799", "scoring_system": "epss", "scoring_elements": "0.82822", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01799", "scoring_system": "epss", "scoring_elements": "0.82821", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02759", "scoring_system": "epss", "scoring_elements": "0.85951", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02759", "scoring_system": "epss", "scoring_elements": "0.85962", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02759", "scoring_system": "epss", "scoring_elements": "0.85978", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02759", "scoring_system": "epss", "scoring_elements": "0.85997", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02759", "scoring_system": "epss", "scoring_elements": "0.86007", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02759", "scoring_system": "epss", "scoring_elements": "0.86021", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02759", "scoring_system": "epss", "scoring_elements": "0.86019", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02759", "scoring_system": "epss", "scoring_elements": "0.86014", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3435" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3435", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3435" }, { "reference_url": "http://secunia.com/advisories/49809", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/49809" }, { "reference_url": "http://secunia.com/advisories/50475", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/50475" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77195" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-5348", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.zabbix.com/browse/ZBX-5348" }, { "reference_url": "http://www.debian.org/security/2012/dsa-2539", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2012/dsa-2539" }, { "reference_url": "http://www.exploit-db.com/exploits/20087", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.exploit-db.com/exploits/20087" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/07/27/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/07/27/6" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/07/28/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/07/28/3" }, { "reference_url": "http://www.securityfocus.com/bid/54661", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/54661" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683273", "reference_id": "683273", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683273" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:*:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3435", "reference_id": "CVE-2012-3435", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3435" }, { "reference_url": "https://security.gentoo.org/glsa/201311-15", "reference_id": "GLSA-201311-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-15" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/20087.py", "reference_id": "OSVDB-84127;CVE-2012-3435", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/20087.py" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2012-3435" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ju7r-4ugw-k7c7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95498?format=api", "vulnerability_id": "VCID-kx3g-p2zj-duaj", "summary": "URL validation scheme receives input from a user and then parses it to identify its various components. The validation scheme can ensure that all URL components comply with internet standards.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29456", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31519", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31478", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36055", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36016", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36041", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.35989", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.35762", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.3573", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.35643", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.35529", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.356", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36006", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36056", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36074", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36081", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36042", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.35704", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.35792", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.35727", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.35795", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29456" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29456", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29456" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175", "reference_id": "1055175", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-22987", "reference_id": "ZBX-22987", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:19:48Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-22987" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2023-29456" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kx3g-p2zj-duaj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95102?format=api", "vulnerability_id": "VCID-mggj-rvdd-eqc6", "summary": "An authenticated user can create a link with reflected Javascript code inside it for services’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24917", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53434", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53429", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53478", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53462", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53445", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53387", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53413", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53382", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75514", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75539", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75518", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75526", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75581", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75438", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75444", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75433", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75468", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75472", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75477", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75485", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24917" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" } ], "aliases": [ "CVE-2022-24917" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mggj-rvdd-eqc6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96210?format=api", "vulnerability_id": "VCID-mhx5-hcg2-wfc4", "summary": "The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaScript payload may be injected into the above endpoint causing it to be executed within the context of the victim's browser.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45699", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.33841", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.33939", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.33866", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43554", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43605", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.4361", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43629", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43597", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43581", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43631", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43566", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43496", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.435", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43417", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43288", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43363", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.4338", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43642", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43591", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43618", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45699" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45699", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45699" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-26254", "reference_id": "ZBX-26254", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T16:28:20Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-26254" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2024-45699" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mhx5-hcg2-wfc4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96115?format=api", "vulnerability_id": "VCID-nrkb-pzcu-8ueg", "summary": "Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36461", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72755", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72714", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72677", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72703", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72536", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72553", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.7253", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72568", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.7258", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72604", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72587", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72576", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72618", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72629", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.7262", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72662", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72671", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72667", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72659", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.7269", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36461" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36461", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36461" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553", "reference_id": "1078553", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-25018", "reference_id": "ZBX-25018", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T15:21:52Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-25018" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2024-36461" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nrkb-pzcu-8ueg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94391?format=api", "vulnerability_id": "VCID-nvpx-ucxf-xkgt", "summary": "Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15803", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02092", "scoring_system": "epss", "scoring_elements": "0.83966", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02092", "scoring_system": "epss", "scoring_elements": "0.83995", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02092", "scoring_system": "epss", "scoring_elements": "0.83998", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02092", "scoring_system": "epss", "scoring_elements": "0.84021", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02092", "scoring_system": "epss", "scoring_elements": "0.84028", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02092", "scoring_system": "epss", "scoring_elements": "0.84045", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02092", "scoring_system": "epss", "scoring_elements": "0.84038", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02092", "scoring_system": "epss", "scoring_elements": "0.8398", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02305", "scoring_system": "epss", "scoring_elements": "0.84748", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05067", "scoring_system": "epss", "scoring_elements": "0.8985", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.05067", "scoring_system": "epss", "scoring_elements": "0.89858", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.05067", "scoring_system": "epss", "scoring_elements": "0.89875", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.05067", "scoring_system": "epss", "scoring_elements": "0.89804", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05067", "scoring_system": "epss", "scoring_elements": "0.89805", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05067", "scoring_system": "epss", "scoring_elements": "0.89799", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05067", "scoring_system": "epss", "scoring_elements": "0.89814", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05067", "scoring_system": "epss", "scoring_elements": "0.89813", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05067", "scoring_system": "epss", "scoring_elements": "0.89828", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05067", "scoring_system": "epss", "scoring_elements": "0.89844", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.05067", "scoring_system": "epss", "scoring_elements": "0.89855", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15803" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15803", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15803" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966146", "reference_id": "966146", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966146" }, { "reference_url": "https://usn.ubuntu.com/USN-4767-1/", "reference_id": "USN-USN-4767-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4767-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995115?format=api", "purl": "pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1" } ], "aliases": [ "CVE-2020-15803" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nvpx-ucxf-xkgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59474?format=api", "vulnerability_id": "VCID-nxzp-nb57-9fhx", "summary": "Multiple vulnerabilities have been found in Zabbix, possibly\n leading to SQL injection attacks, Denial of Service, or information\n disclosure.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2904", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73381", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.7339", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73413", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73385", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73422", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73435", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73459", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73439", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73431", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73474", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73483", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73476", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73509", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73521", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73518", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73512", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73537", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.7356", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.7352", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73543", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73601", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2904" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2904", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2904" }, { "reference_url": "https://security.gentoo.org/glsa/201311-15", "reference_id": "GLSA-201311-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2011-2904" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nxzp-nb57-9fhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94337?format=api", "vulnerability_id": "VCID-p9f4-1jph-qff7", "summary": "Zabbix Server 2.2.x and 3.0.x before 3.0.31, and 3.2 allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11800", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.47753", "scoring_system": "epss", "scoring_elements": "0.97687", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.47753", "scoring_system": "epss", "scoring_elements": "0.97693", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.47753", "scoring_system": "epss", "scoring_elements": "0.97694", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.47753", "scoring_system": "epss", "scoring_elements": "0.97698", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.47753", "scoring_system": "epss", "scoring_elements": "0.97701", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.47753", "scoring_system": "epss", "scoring_elements": "0.97705", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.47753", "scoring_system": "epss", "scoring_elements": "0.97707", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.47753", "scoring_system": "epss", "scoring_elements": "0.97708", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.47753", "scoring_system": "epss", "scoring_elements": "0.97714", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.47753", "scoring_system": "epss", "scoring_elements": "0.97718", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.47753", "scoring_system": "epss", "scoring_elements": "0.97717", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.47753", "scoring_system": "epss", "scoring_elements": "0.97723", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.47753", "scoring_system": "epss", "scoring_elements": "0.97726", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.47753", "scoring_system": "epss", "scoring_elements": "0.97728", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.47753", "scoring_system": "epss", "scoring_elements": "0.9773", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.47753", "scoring_system": "epss", "scoring_elements": "0.97734", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.47753", "scoring_system": "epss", "scoring_elements": "0.97742", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11800" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11800", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11800" }, { "reference_url": "https://usn.ubuntu.com/USN-4767-1/", "reference_id": "USN-USN-4767-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4767-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050325?format=api", "purl": "pkg:deb/debian/zabbix@1:4.0.4%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:4.0.4%252Bdfsg-1" } ], "aliases": [ "CVE-2020-11800" ], "risk_score": 0.2, "exploitability": "0.5", "weighted_severity": "0.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p9f4-1jph-qff7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96177?format=api", "vulnerability_id": "VCID-psak-h1x6-1kca", "summary": "Zabbix API user.get returns all users that share common group with the calling user. This includes media and other information, such as login attempts, etc.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-42325", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1665", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1677", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16687", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28263", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28198", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28111", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.27999", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.27921", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.27756", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.27818", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.27844", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28348", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28352", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28309", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28251", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28245", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31731", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31594", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31647", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31776", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42325" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-26258", "reference_id": "ZBX-26258", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:48:54Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-26258" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2024-42325" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-psak-h1x6-1kca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95104?format=api", "vulnerability_id": "VCID-qhxc-w75p-kqaj", "summary": "An authenticated user can create a link with reflected Javascript code inside it for graphs’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24919", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53434", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53429", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53478", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53462", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53445", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53387", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53413", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53382", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75514", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75539", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75518", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75526", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75581", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75438", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75444", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75433", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75468", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75472", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75477", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00882", "scoring_system": "epss", "scoring_elements": "0.75485", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24919" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24919", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24919" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" } ], "aliases": [ "CVE-2022-24919" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qhxc-w75p-kqaj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95494?format=api", "vulnerability_id": "VCID-r65p-6wkq-sfb9", "summary": "JavaScript pre-processing can be used by the attacker to gain access to the file system (read-only access on behalf of user \"zabbix\") on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29450", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00254", "scoring_system": "epss", "scoring_elements": "0.48662", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00254", "scoring_system": "epss", "scoring_elements": "0.48684", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.5228", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52339", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52376", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52321", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52374", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52369", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52419", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52403", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52389", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52428", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52366", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52434", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52331", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54134", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54081", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54039", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54065", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29450" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29450" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175", "reference_id": "1055175", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-22588", "reference_id": "ZBX-22588", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T14:20:54Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-22588" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2023-29450" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r65p-6wkq-sfb9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92855?format=api", "vulnerability_id": "VCID-sssa-fyxz-xfbz", "summary": "Zabbix before 2.2.21rc1, 3.x before 3.0.13rc1, 3.1.x and 3.2.x before 3.2.10rc1, and 3.3.x and 3.4.x before 3.4.4rc1 allows open redirect via the request parameter.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10742", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60456", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60396", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60212", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60289", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60314", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60282", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60332", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60347", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60368", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60355", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60336", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60377", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60385", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60374", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60345", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.6036", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60306", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60353", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60412", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00394", "scoring_system": "epss", "scoring_elements": "0.60369", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10742" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-10272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.zabbix.com/browse/ZBX-10272" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-13133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.zabbix.com/browse/ZBX-13133" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10742", "reference_id": "CVE-2016-10742", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" }, { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10742" }, { "reference_url": "https://usn.ubuntu.com/USN-4767-1/", "reference_id": "USN-USN-4767-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4767-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050325?format=api", "purl": "pkg:deb/debian/zabbix@1:4.0.4%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:4.0.4%252Bdfsg-1" } ], "aliases": [ "CVE-2016-10742" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sssa-fyxz-xfbz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94694?format=api", "vulnerability_id": "VCID-upzh-6yjy-tff3", "summary": "In Zabbix from 4.0.x before 4.0.28rc1, 5.0.0alpha1 before 5.0.10rc1, 5.2.x before 5.2.6rc1, and 5.4.0alpha1 before 5.4.0beta2, the CControllerAuthenticationUpdate controller lacks a CSRF protection mechanism. The code inside this controller calls diableSIDValidation inside the init() method. An attacker doesn't have to know Zabbix user login credentials, but has to know the correct Zabbix URL and contact information of an existing user with sufficient privileges.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-27927", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22583", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22418", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22401", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22433", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22356", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22271", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22369", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22371", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22381", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22533", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22587", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25343", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31691", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34928", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34964", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3496", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34931", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34886", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.35006", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3498", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34781", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-27927" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27927", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27927" }, { "reference_url": "https://security.archlinux.org/AVG-1771", "reference_id": "AVG-1771", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1771" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995115?format=api", "purl": "pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1" } ], "aliases": [ "CVE-2021-27927" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-upzh-6yjy-tff3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95103?format=api", "vulnerability_id": "VCID-uu3f-3rbn-9fad", "summary": "An authenticated user can create a link with reflected Javascript code inside it for items’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24918", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76789", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76569", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76598", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76578", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.7661", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76621", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76647", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76627", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76617", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76659", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76663", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76651", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76682", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76689", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76701", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.7672", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76738", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76725", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76742", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24918" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" } ], "aliases": [ "CVE-2022-24918" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uu3f-3rbn-9fad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96180?format=api", "vulnerability_id": "VCID-uxdf-6tyd-rucd", "summary": "The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-42332", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62355", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62321", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62273", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62301", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.6216", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62191", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62158", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62208", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62226", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62244", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62234", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62212", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62258", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62265", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62249", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62259", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62276", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62269", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62214", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62263", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-42332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42332" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689", "reference_id": "1088689", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-25628", "reference_id": "ZBX-25628", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:54:59Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-25628" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2024-42332" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uxdf-6tyd-rucd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94076?format=api", "vulnerability_id": "VCID-uxf8-8rzq-kfhm", "summary": "An issue was discovered in zabbix.php?action=dashboard.view&dashboardid=1 in Zabbix through 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any Username/Password (i.e., anonymously). All created elements (Dashboard/Report/Screen/Map) are accessible by other users and by an admin.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17382", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.93689", "scoring_system": "epss", "scoring_elements": "0.99853", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.93689", "scoring_system": "epss", "scoring_elements": "0.99852", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.93689", "scoring_system": "epss", "scoring_elements": "0.99846", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.93689", "scoring_system": "epss", "scoring_elements": "0.99847", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.93689", "scoring_system": "epss", "scoring_elements": "0.99848", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.93689", "scoring_system": "epss", "scoring_elements": "0.99849", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.93689", "scoring_system": "epss", "scoring_elements": "0.9985", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.93689", "scoring_system": "epss", "scoring_elements": "0.99851", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17382" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17382", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17382" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html" }, { "reference_url": "https://www.exploit-db.com/exploits/47467", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/47467" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17382", "reference_id": "CVE-2019-17382", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:N" }, { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17382" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995115?format=api", "purl": "pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1" } ], "aliases": [ "CVE-2019-17382" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uxf8-8rzq-kfhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93205?format=api", "vulnerability_id": "VCID-v3cn-k1r9-zkg4", "summary": "An information disclosure vulnerability exists in the iConfig proxy request of Zabbix server 2.4.X. A specially crafted iConfig proxy request can cause the Zabbix server to send the configuration information of any Zabbix proxy, resulting in information disclosure. An attacker can make requests from an active Zabbix proxy to trigger this vulnerability.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2826", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49537", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49567", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49594", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49546", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49601", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49595", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49612", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49583", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49584", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49631", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49629", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.496", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49591", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.4956", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49477", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49536", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49566", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49514", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49541", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49611", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2826" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2826", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2826" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050325?format=api", "purl": "pkg:deb/debian/zabbix@1:4.0.4%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:4.0.4%252Bdfsg-1" } ], "aliases": [ "CVE-2017-2826" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v3cn-k1r9-zkg4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85433?format=api", "vulnerability_id": "VCID-vq8w-tph7-hfav", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2825", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.70381", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.70331", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.70136", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.70148", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.70164", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.70141", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.70189", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.70204", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.70227", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.70212", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.70199", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.70241", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.7025", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.70229", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.7028", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.70288", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.70287", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.70261", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.70303", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.70336", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00626", "scoring_system": "epss", "scoring_elements": "0.70304", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2825" }, { "reference_url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0326" }, { "reference_url": "https://www.debian.org/security/2017/dsa-3937", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2017/dsa-3937" }, { "reference_url": "http://www.securityfocus.com/bid/98094", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/98094" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863584", "reference_id": "863584", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863584" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2825", "reference_id": "CVE-2017-2825", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2825" }, { "reference_url": "https://usn.ubuntu.com/USN-4767-1/", "reference_id": "USN-USN-4767-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4767-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035771?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.7%2Bdfsg-2%2Bdeb8u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.7%252Bdfsg-2%252Bdeb8u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050324?format=api", "purl": "pkg:deb/debian/zabbix@1:3.0.7%2Bdfsg-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:3.0.7%252Bdfsg-3" } ], "aliases": [ "CVE-2017-2825" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vq8w-tph7-hfav" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95946?format=api", "vulnerability_id": "VCID-wczj-cv1m-7qce", "summary": "An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-22116", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00497", "scoring_system": "epss", "scoring_elements": "0.66016", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00497", "scoring_system": "epss", "scoring_elements": "0.65971", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00497", "scoring_system": "epss", "scoring_elements": "0.65941", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00497", "scoring_system": "epss", "scoring_elements": "0.65961", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00497", "scoring_system": "epss", "scoring_elements": "0.65815", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00497", "scoring_system": "epss", "scoring_elements": "0.65845", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00497", "scoring_system": "epss", "scoring_elements": "0.65811", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00497", "scoring_system": "epss", "scoring_elements": "0.65863", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00497", "scoring_system": "epss", "scoring_elements": "0.65875", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00497", "scoring_system": "epss", "scoring_elements": "0.65894", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00497", "scoring_system": "epss", "scoring_elements": "0.65881", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00497", "scoring_system": "epss", "scoring_elements": "0.65851", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00497", "scoring_system": "epss", "scoring_elements": "0.65886", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00497", "scoring_system": "epss", "scoring_elements": "0.65901", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00497", "scoring_system": "epss", "scoring_elements": "0.65889", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00497", "scoring_system": "epss", "scoring_elements": "0.65899", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00497", "scoring_system": "epss", "scoring_elements": "0.6591", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00497", "scoring_system": "epss", "scoring_elements": "0.65908", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00497", "scoring_system": "epss", "scoring_elements": "0.65882", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00497", "scoring_system": "epss", "scoring_elements": "0.65928", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-22116" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22116", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22116" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553", "reference_id": "1078553", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-25016", "reference_id": "ZBX-25016", "reference_type": "", "scores": [ { "value": "9.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-04T04:55:28Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-25016" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2024-22116" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wczj-cv1m-7qce" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95292?format=api", "vulnerability_id": "VCID-wfae-uyd7-ybc3", "summary": "Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix Frontend while it is being maintained and possible sensitive data will be prevented from being disclosed. An attacker can bypass this protection and access the instance using IP address not listed in the defined range.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43515", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31727", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31813", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31684", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.3172", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.3176", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31757", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31857", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31676", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38656", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38557", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38631", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38644", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38558", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38582", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39728", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39644", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39465", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39451", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39369", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39757", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43515" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026847", "reference_id": "1026847", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026847" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-22050", "reference_id": "ZBX-22050", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T17:57:56Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-22050" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" } ], "aliases": [ "CVE-2022-43515" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wfae-uyd7-ybc3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92571?format=api", "vulnerability_id": "VCID-x4be-du7g-kuav", "summary": "The API in Zabbix before 1.8.20rc1, 2.0.x before 2.0.11rc1, and 2.2.x before 2.2.2rc1 allows remote authenticated users to spoof arbitrary users via the user name in a user.login request.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1682", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48512", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48547", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48571", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48523", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48577", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48573", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48594", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48567", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.4858", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.4863", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48626", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48583", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48568", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48579", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48527", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48443", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48505", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.4853", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48475", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48504", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1682" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1682", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1682" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737818", "reference_id": "737818", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737818" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2014-1682" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x4be-du7g-kuav" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95540?format=api", "vulnerability_id": "VCID-xjj4-u4gj-x7ea", "summary": "Request to LDAP is sent before user permissions are checked.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32723", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31341", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31339", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31247", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.3127", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31937", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31979", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31798", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.3185", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.3188", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31884", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31845", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31809", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31841", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31821", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31792", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31624", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31497", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31412", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31263", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31331", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32723" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32723", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32723" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877", "reference_id": "1053877", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html", "reference_id": "msg00012.html", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:43:34Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-23230", "reference_id": "ZBX-23230", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:43:34Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-23230" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995115?format=api", "purl": "pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1" } ], "aliases": [ "CVE-2023-32723" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xjj4-u4gj-x7ea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96181?format=api", "vulnerability_id": "VCID-zc7p-7yts-5yae", "summary": "The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-42333", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.2673", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26682", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26673", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26826", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26866", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26652", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.2672", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.2677", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26774", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.3222", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32222", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32131", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32152", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.3267", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32641", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32486", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32371", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32287", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32148", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32212", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-42333" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42333", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42333" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689", "reference_id": "1088689", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-25629", "reference_id": "ZBX-25629", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:54:27Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-25629" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2024-42333" ], "risk_score": 0.7, "exploitability": "0.5", "weighted_severity": "1.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zc7p-7yts-5yae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91988?format=api", "vulnerability_id": "VCID-zemm-yb4a-4bc5", "summary": "The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attacks from trusted IP addresses.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4502", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.64138", "scoring_system": "epss", "scoring_elements": "0.98424", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.64138", "scoring_system": "epss", "scoring_elements": "0.98427", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.64138", "scoring_system": "epss", "scoring_elements": "0.9843", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.64138", "scoring_system": "epss", "scoring_elements": "0.98432", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.64138", "scoring_system": "epss", "scoring_elements": "0.98435", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.64138", "scoring_system": "epss", "scoring_elements": "0.98436", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.64138", "scoring_system": "epss", "scoring_elements": "0.98439", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.64138", "scoring_system": "epss", "scoring_elements": "0.98443", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.64138", "scoring_system": "epss", "scoring_elements": "0.98442", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.64138", "scoring_system": "epss", "scoring_elements": "0.98445", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.64138", "scoring_system": "epss", "scoring_elements": "0.98446", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.64138", "scoring_system": "epss", "scoring_elements": "0.9845", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.64138", "scoring_system": "epss", "scoring_elements": "0.98452", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.64138", "scoring_system": "epss", "scoring_elements": "0.98451", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.64138", "scoring_system": "epss", "scoring_elements": "0.98453", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.64138", "scoring_system": "epss", "scoring_elements": "0.98456", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4502" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4502", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4502" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613", "reference_id": "562613", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/freebsd/remote/16918.rb", "reference_id": "CVE-2009-4502;OSVDB-60956", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/freebsd/remote/16918.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/10431.txt", "reference_id": "CVE-2009-4502;OSVDB-60956", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/10431.txt" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035769?format=api", "purl": "pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-18fv-tqjq-p3ce" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-2hd4-rbph-5qd8" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5dku-ycr7-2uek" }, { "vulnerability": "VCID-5r88-rt1s-8ydf" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-69kr-fmzb-nbdr" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-8cpy-mqfn-y3f9" }, { "vulnerability": "VCID-9aju-xvg1-n7e5" }, { "vulnerability": "VCID-9t49-tzah-zkhb" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b648-nvxx-hfft" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-c2w8-zs9u-z7a9" }, { "vulnerability": "VCID-cbnd-ytgt-dycn" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-f837-pma5-jyha" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-gbn9-b2t2-5fbs" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mggj-rvdd-eqc6" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nvpx-ucxf-xkgt" }, { "vulnerability": "VCID-p9f4-1jph-qff7" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qhxc-w75p-kqaj" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-sssa-fyxz-xfbz" }, { "vulnerability": "VCID-upzh-6yjy-tff3" }, { "vulnerability": "VCID-uu3f-3rbn-9fad" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-uxf8-8rzq-kfhm" }, { "vulnerability": "VCID-v3cn-k1r9-zkg4" }, { "vulnerability": "VCID-vq8w-tph7-hfav" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-wfae-uyd7-ybc3" }, { "vulnerability": "VCID-xjj4-u4gj-x7ea" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1" } ], "aliases": [ "CVE-2009-4502" ], "risk_score": 1.2, "exploitability": "2.0", "weighted_severity": "0.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zemm-yb4a-4bc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95947?format=api", "vulnerability_id": "VCID-zrfp-skzu-cbet", "summary": "When a URL is added to the map element, it is recorded in the database with sequential IDs. Upon adding a new URL, the system retrieves the last sysmapelementurlid value and increments it by one. However, an issue arises when a user manually changes the sysmapelementurlid value by adding sysmapelementurlid + 1. This action prevents others from adding URLs to the map element.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-22117", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17756", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1768", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1764", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17676", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1797", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18024", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17723", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17811", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17871", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17887", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17844", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17795", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1774", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1775", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17788", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17698", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17675", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1763", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17488", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17581", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-22117" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22117", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22117" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.zabbix.com/browse/ZBX-25610", "reference_id": "ZBX-25610", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-26T15:03:28Z/" } ], "url": "https://support.zabbix.com/browse/ZBX-25610" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994478?format=api", "purl": "pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-172p-q6d5-9ya3" }, { "vulnerability": "VCID-1xr6-n296-cyfd" }, { "vulnerability": "VCID-3g1d-2tvh-akh4" }, { "vulnerability": "VCID-3qru-uxsd-e3c8" }, { "vulnerability": "VCID-464s-8ex9-kqdz" }, { "vulnerability": "VCID-4s92-5es4-yka5" }, { "vulnerability": "VCID-4uxg-fxv7-rua8" }, { "vulnerability": "VCID-547a-p94b-6fep" }, { "vulnerability": "VCID-5nmy-hdh8-xbg1" }, { "vulnerability": "VCID-5s7j-6aea-qucr" }, { "vulnerability": "VCID-5t3e-bfve-d3he" }, { "vulnerability": "VCID-673b-qsd3-e3hz" }, { "vulnerability": "VCID-6u3x-x7qt-g3fa" }, { "vulnerability": "VCID-76qf-8jm4-8kct" }, { "vulnerability": "VCID-7bzf-3c9x-8qc4" }, { "vulnerability": "VCID-7f3g-hebk-3qad" }, { "vulnerability": "VCID-7yp1-231f-a3eq" }, { "vulnerability": "VCID-9jfn-6nvg-a3b6" }, { "vulnerability": "VCID-9z8h-gg7t-b7f8" }, { "vulnerability": "VCID-aetr-jrab-6fg5" }, { "vulnerability": "VCID-b8tm-2187-wkhz" }, { "vulnerability": "VCID-batr-txtv-s3cf" }, { "vulnerability": "VCID-cdyd-79m9-pyhv" }, { "vulnerability": "VCID-cuqx-wxkd-nffa" }, { "vulnerability": "VCID-d7uk-h423-77f5" }, { "vulnerability": "VCID-dej6-dxbp-a3bt" }, { "vulnerability": "VCID-ftt2-5jnt-9ye2" }, { "vulnerability": "VCID-fxqr-51kp-3ber" }, { "vulnerability": "VCID-gp3f-yz9h-eqax" }, { "vulnerability": "VCID-gyqk-zsww-ykdj" }, { "vulnerability": "VCID-kx3g-p2zj-duaj" }, { "vulnerability": "VCID-mhx5-hcg2-wfc4" }, { "vulnerability": "VCID-n5md-76wa-dbaa" }, { "vulnerability": "VCID-nrkb-pzcu-8ueg" }, { "vulnerability": "VCID-nyhx-57xy-wugc" }, { "vulnerability": "VCID-psak-h1x6-1kca" }, { "vulnerability": "VCID-qzp5-px2f-vqc8" }, { "vulnerability": "VCID-qzzk-mcfu-sfhv" }, { "vulnerability": "VCID-r65p-6wkq-sfb9" }, { "vulnerability": "VCID-r8yr-aet5-yydn" }, { "vulnerability": "VCID-ry8x-mjbp-qqct" }, { "vulnerability": "VCID-s1mb-1gsj-pbed" }, { "vulnerability": "VCID-sudd-unuw-wqa9" }, { "vulnerability": "VCID-uh37-bv9z-1bdz" }, { "vulnerability": "VCID-uxdf-6tyd-rucd" }, { "vulnerability": "VCID-vkfp-asar-7bhw" }, { "vulnerability": "VCID-wczj-cv1m-7qce" }, { "vulnerability": "VCID-zc7p-7yts-5yae" }, { "vulnerability": "VCID-zrfp-skzu-cbet" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994479?format=api", "purl": "pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1" } ], "aliases": [ "CVE-2024-22117" ], "risk_score": 0.7, "exploitability": "0.5", "weighted_severity": "1.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zrfp-skzu-cbet" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.1.4-10etch1" }