{"url":"http://public2.vulnerablecode.io/api/packages/1035768?format=json","purl":"pkg:deb/debian/zabbix@1:1.4.6-1","type":"deb","namespace":"debian","name":"zabbix","version":"1:1.4.6-1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"1:7.0.9+dfsg-1~bpo12+1","latest_non_vulnerable_version":"1:7.0.9+dfsg-1~bpo12+1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96119?format=json","vulnerability_id":"VCID-172p-q6d5-9ya3","summary":"Execution time for an unsuccessful login differs when using a non-existing username compared to using an existing one.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36469","reference_id":"","reference_type":"","scores":[{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31244","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31791","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31823","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31803","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31773","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31606","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31478","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31394","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31861","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31865","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31826","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35753","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35726","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35633","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35679","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36469"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-26255","reference_id":"ZBX-26255","reference_type":"","scores":[{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:00:32Z/"}],"url":"https://support.zabbix.com/browse/ZBX-26255"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2024-36469"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-172p-q6d5-9ya3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95100?format=json","vulnerability_id":"VCID-18fv-tqjq-p3ce","summary":"An authenticated user can create a link with reflected XSS payload for actions’ pages, and send it to other users. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim. This attack can be implemented with the help of social engineering and expiration of a number of factors - an attacker should have authorized access to the Zabbix Frontend and allowed network connection between a malicious server and victim’s computer, understand attacked infrastructure, be recognized by the victim as a trustee and use trusted communication channel.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24349","reference_id":"","reference_type":"","scores":[{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43854","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43878","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43902","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43832","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43883","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43886","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43904","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43871","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00849","scoring_system":"epss","scoring_elements":"0.74955","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00849","scoring_system":"epss","scoring_elements":"0.74904","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00849","scoring_system":"epss","scoring_elements":"0.74911","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00849","scoring_system":"epss","scoring_elements":"0.74902","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00849","scoring_system":"epss","scoring_elements":"0.74938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00849","scoring_system":"epss","scoring_elements":"0.74945","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00849","scoring_system":"epss","scoring_elements":"0.74948","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24349"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24349","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24349"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"}],"aliases":["CVE-2022-24349"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-18fv-tqjq-p3ce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95948?format=json","vulnerability_id":"VCID-1xr6-n296-cyfd","summary":"The cause of vulnerability is improper validation of form input field “Name” on Graph page in Items section.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22119","reference_id":"","reference_type":"","scores":[{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62086","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62149","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62133","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62131","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62147","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.6214","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62042","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62074","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62043","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62093","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.6211","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.6213","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.6212","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62099","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62143","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22119","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22119"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00020.html","reference_id":"msg00020.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T14:54:06Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00020.html"},{"reference_url":"https://support.zabbix.com/browse/ZBX-24070","reference_id":"ZBX-24070","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T14:54:06Z/"}],"url":"https://support.zabbix.com/browse/ZBX-24070"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2024-22119"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1xr6-n296-cyfd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92257?format=json","vulnerability_id":"VCID-24sd-pp6s-e3gv","summary":"Cross-site scripting (XSS) vulnerability in ZABBIX before 1.8.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the profiler.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-5027","reference_id":"","reference_type":"","scores":[{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63177","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63236","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63265","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63282","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63317","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.633","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63264","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63301","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63308","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63288","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63307","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6332","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63318","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63286","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-5027"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5027","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5027"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652664","reference_id":"652664","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652664"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2011-5027"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-24sd-pp6s-e3gv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92197?format=json","vulnerability_id":"VCID-2dx4-612r-afcm","summary":"Zabbix before 1.8.6 allows remote attackers to obtain sensitive information via an invalid srcfld2 parameter to popup.php, which reveals the installation path in an error message.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3264","reference_id":"","reference_type":"","scores":[{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63742","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63804","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.6383","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63788","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63839","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63856","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63822","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63857","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63866","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63855","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63872","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63884","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63882","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63853","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3264"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3264","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3264"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2011-3264"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2dx4-612r-afcm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95076?format=json","vulnerability_id":"VCID-2hd4-rbph-5qd8","summary":"An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23133","reference_id":"","reference_type":"","scores":[{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76605","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76477","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76489","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76521","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76532","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76558","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76537","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76573","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76577","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76565","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76598","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76603","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76617","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23133"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"}],"aliases":["CVE-2022-23133"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2hd4-rbph-5qd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96211?format=json","vulnerability_id":"VCID-3g1d-2tvh-akh4","summary":"Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attacker can send specially crafted requests to the server, which will cause the server to allocate an excessive amount of memory and perform CPU-intensive decompression operations, ultimately leading to a service crash.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45700","reference_id":"","reference_type":"","scores":[{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41442","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.4166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41661","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41583","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41788","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41817","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41746","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41796","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41805","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41829","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41783","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41832","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41734","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45700"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-26253","reference_id":"ZBX-26253","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T16:27:38Z/"}],"url":"https://support.zabbix.com/browse/ZBX-26253"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2024-45700"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3g1d-2tvh-akh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92198?format=json","vulnerability_id":"VCID-3p27-zs76-b3bg","summary":"popup.php in Zabbix before 1.8.7 allows remote attackers to read the contents of arbitrary database tables via a modified srctbl parameter.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3265","reference_id":"","reference_type":"","scores":[{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66587","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66626","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66652","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66675","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.6669","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66709","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66697","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66667","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66701","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66714","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66699","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66723","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66735","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66732","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66704","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3265"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2011-3265"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3p27-zs76-b3bg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91986?format=json","vulnerability_id":"VCID-3pw5-bega-j7bg","summary":"The process_trap function in trapper/trapper.c in Zabbix Server before 1.6.6 allows remote attackers to cause a denial of service (crash) via a crafted request with data that lacks an expected : (colon) separator, which triggers a NULL pointer dereference.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4500","reference_id":"","reference_type":"","scores":[{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72684","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.7271","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72688","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72727","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.7274","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72764","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72747","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72738","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.7278","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72791","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72782","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72823","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72832","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72829","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4500"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613","reference_id":"562613","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2009-4500"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3pw5-bega-j7bg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95949?format=json","vulnerability_id":"VCID-3qru-uxsd-e3c8","summary":"Zabbix allows to configure SMS notifications. AT command injection occurs on \"Zabbix Server\" because there is no validation of \"Number\" field on Web nor on Zabbix server side. Attacker can run test of SMS providing specially crafted phone number and execute additional AT commands on modem.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22122","reference_id":"","reference_type":"","scores":[{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.6317","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63136","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63158","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63172","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.6307","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.631","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63064","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63116","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63133","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.6315","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63135","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63113","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63148","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63155","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22122"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22122","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22122"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553","reference_id":"1078553","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25012","reference_id":"ZBX-25012","reference_type":"","scores":[{"value":"3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T14:46:40Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25012"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2024-22122"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3qru-uxsd-e3c8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95538?format=json","vulnerability_id":"VCID-464s-8ex9-kqdz","summary":"A stored XSS has been found in the Zabbix web application in the Maps element if a URL field is set with spaces before URL.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32721","reference_id":"","reference_type":"","scores":[{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72324","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72301","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.7234","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72352","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72375","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72358","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72346","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72387","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72397","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72384","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72427","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72436","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72432","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72424","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32721"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877","reference_id":"1053877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2023-32721"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-464s-8ex9-kqdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95945?format=json","vulnerability_id":"VCID-4s92-5es4-yka5","summary":"User with no permission to any of the Hosts can access and view host count & other statistics through System Information Widget in Global View Dashboard.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22114","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38564","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38797","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38774","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38687","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.391","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39122","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3904","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39096","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39112","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39124","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39087","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39067","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39092","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39004","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22114","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22114"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553","reference_id":"1078553","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25015","reference_id":"ZBX-25015","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T12:39:48Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25015"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2024-22114"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4s92-5es4-yka5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95543?format=json","vulnerability_id":"VCID-4uxg-fxv7-rua8","summary":"An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32727","reference_id":"","reference_type":"","scores":[{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64368","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64302","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.6436","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64381","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64394","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64331","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64287","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.6435","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64363","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64351","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64322","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64358","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64369","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32727","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32727"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-23857","reference_id":"ZBX-23857","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:37:31Z/"}],"url":"https://support.zabbix.com/browse/ZBX-23857"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2023-32727"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4uxg-fxv7-rua8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95539?format=json","vulnerability_id":"VCID-547a-p94b-6fep","summary":"The zabbix/src/libs/zbxjson module is vulnerable to a buffer overflow when parsing JSON files via zbx_json_open.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32722","reference_id":"","reference_type":"","scores":[{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57925","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57972","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57969","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57985","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57968","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.5799","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57966","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58022","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58024","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58041","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58019","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57999","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58029","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58028","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58005","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32722"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877","reference_id":"1053877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877"},{"reference_url":"https://support.zabbix.com/browse/ZBX-23390","reference_id":"ZBX-23390","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-18T15:26:49Z/"}],"url":"https://support.zabbix.com/browse/ZBX-23390"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2023-32722"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-547a-p94b-6fep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91985?format=json","vulnerability_id":"VCID-55mr-z77t-xbhh","summary":"SQL injection vulnerability in the get_history_lastid function in the nodewatcher component in Zabbix Server before 1.6.8 allows remote attackers to execute arbitrary SQL commands via a crafted request, possibly related to the send_history_last_id function in zabbix_server/trapper/nodehistory.c.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4499","reference_id":"","reference_type":"","scores":[{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47559","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47598","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47619","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47568","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47623","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47618","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47642","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47627","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47685","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47677","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.4763","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.4761","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47565","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.4748","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4499"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613","reference_id":"562613","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2009-4499"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-55mr-z77t-xbhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92427?format=json","vulnerability_id":"VCID-5b6p-zpce-8ygy","summary":"libs/zbxmedia/eztexting.c in Zabbix 1.8.x before 1.8.18rc1, 2.0.x before 2.0.8rc1, and 2.1.x before 2.1.2 does not properly set the CURLOPT_SSL_VERIFYHOST option for libcurl, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6086","reference_id":"","reference_type":"","scores":[{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41267","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.4136","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41389","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41316","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41367","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41374","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41395","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41363","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41392","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.4129","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41178","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41172","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41093","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.40954","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6086"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6086","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6086"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697443","reference_id":"697443","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697443"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2012-6086"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5b6p-zpce-8ygy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81331?format=json","vulnerability_id":"VCID-5dku-ycr7-2uek","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10134","reference_id":"","reference_type":"","scores":[{"value":"0.86228","scoring_system":"epss","scoring_elements":"0.99397","published_at":"2026-04-02T12:55:00Z"},{"value":"0.86228","scoring_system":"epss","scoring_elements":"0.99398","published_at":"2026-04-04T12:55:00Z"},{"value":"0.86228","scoring_system":"epss","scoring_elements":"0.994","published_at":"2026-04-08T12:55:00Z"},{"value":"0.86228","scoring_system":"epss","scoring_elements":"0.99401","published_at":"2026-04-09T12:55:00Z"},{"value":"0.86228","scoring_system":"epss","scoring_elements":"0.99402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.86228","scoring_system":"epss","scoring_elements":"0.99403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.86228","scoring_system":"epss","scoring_elements":"0.99406","published_at":"2026-05-05T12:55:00Z"},{"value":"0.86228","scoring_system":"epss","scoring_elements":"0.99405","published_at":"2026-04-18T12:55:00Z"},{"value":"0.86228","scoring_system":"epss","scoring_elements":"0.99407","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10134"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936","reference_id":"850936","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936"},{"reference_url":"https://usn.ubuntu.com/USN-4767-1/","reference_id":"USN-USN-4767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4767-1/"},{"reference_url":"https://support.zabbix.com/browse/ZBX-11023","reference_id":"ZBX-11023","reference_type":"","scores":[],"url":"https://support.zabbix.com/browse/ZBX-11023"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035771?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.7%2Bdfsg-2%2Bdeb8u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.7%252Bdfsg-2%252Bdeb8u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1050323?format=json","purl":"pkg:deb/debian/zabbix@1:3.0.7%2Bdfsg-1~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:3.0.7%252Bdfsg-1~bpo8%252B1"}],"aliases":["CVE-2016-10134","ZBX-11023"],"risk_score":1.6,"exploitability":"2.0","weighted_severity":"0.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5dku-ycr7-2uek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59478?format=json","vulnerability_id":"VCID-5krc-4z83-cufk","summary":"Multiple vulnerabilities have been found in Zabbix, possibly\n    leading to SQL injection attacks, Denial of Service, or information\n    disclosure.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1364","reference_id":"","reference_type":"","scores":[{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63156","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63215","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63244","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.6321","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63261","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63279","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.6328","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63282","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63289","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63269","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63287","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63301","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63267","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1364"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698541","reference_id":"698541","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698541"},{"reference_url":"https://security.gentoo.org/glsa/201311-15","reference_id":"GLSA-201311-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201311-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2013-1364"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5krc-4z83-cufk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59479?format=json","vulnerability_id":"VCID-5mpe-ycm1-wucw","summary":"Multiple vulnerabilities have been found in Zabbix, possibly\n    leading to SQL injection attacks, Denial of Service, or information\n    disclosure.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5572","reference_id":"","reference_type":"","scores":[{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91946","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91954","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91962","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91968","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91981","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91984","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91987","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91986","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91983","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.92002","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91999","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91995","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.92","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.92008","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5572"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/36157.rb","reference_id":"CVE-2013-5572;OSVDB-97811","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/36157.rb"},{"reference_url":"https://security.gentoo.org/glsa/201311-15","reference_id":"GLSA-201311-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201311-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2013-5572"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5mpe-ycm1-wucw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92598?format=json","vulnerability_id":"VCID-5r88-rt1s-8ydf","summary":"XML external entity (XXE) vulnerability in Zabbix 1.8.x before 1.8.21rc1, 2.0.x before 2.0.13rc1, 2.2.x before 2.2.5rc1, and 2.3.x before 2.3.2 allows remote attackers to read arbitrary files or potentially execute arbitrary code via a crafted DTD in an XML request.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3005","reference_id":"","reference_type":"","scores":[{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88802","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.8881","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88826","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88846","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88851","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88863","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88858","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88872","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.8887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88867","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88884","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88891","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88899","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3005"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751910","reference_id":"751910","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751910"},{"reference_url":"https://usn.ubuntu.com/USN-4767-1/","reference_id":"USN-USN-4767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4767-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035770?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.7%2Bdfsg-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.7%252Bdfsg-2"}],"aliases":["CVE-2014-3005"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5r88-rt1s-8ydf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95496?format=json","vulnerability_id":"VCID-5s7j-6aea-qucr","summary":"Stored or persistent cross-site scripting (XSS) is a type of XSS where the attacker first sends the payload to the web application, then the application saves the payload (e.g., in a database or server-side text files), and finally, the application unintentionally executes the payload for every victim visiting its web pages.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29454","reference_id":"","reference_type":"","scores":[{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70673","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70654","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74245","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74209","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74244","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74253","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74251","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74126","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74174","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74195","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74177","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.7417","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74208","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74217","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29454"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175","reference_id":"1055175","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"},{"reference_url":"https://support.zabbix.com/browse/ZBX-22985","reference_id":"ZBX-22985","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T21:06:47Z/"}],"url":"https://support.zabbix.com/browse/ZBX-22985"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2023-29454"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5s7j-6aea-qucr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59475?format=json","vulnerability_id":"VCID-656n-db2u-2bch","summary":"Multiple vulnerabilities have been found in Zabbix, possibly\n    leading to SQL injection attacks, Denial of Service, or information\n    disclosure.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3263","reference_id":"","reference_type":"","scores":[{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64802","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64852","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64842","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64892","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64924","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64914","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64886","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64923","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64933","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64917","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64936","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64949","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64945","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64926","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3263"},{"reference_url":"https://security.gentoo.org/glsa/201311-15","reference_id":"GLSA-201311-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201311-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2011-3263"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-656n-db2u-2bch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95497?format=json","vulnerability_id":"VCID-673b-qsd3-e3hz","summary":"Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script is activated through a link, which sends a request to a website with a vulnerability that enables execution of malicious scripts.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29455","reference_id":"","reference_type":"","scores":[{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75899","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75866","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79149","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79081","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79114","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79121","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79136","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79028","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79052","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79059","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79083","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79068","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79058","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79082","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29455"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29455","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29455"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175","reference_id":"1055175","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"},{"reference_url":"https://support.zabbix.com/browse/ZBX-22986","reference_id":"ZBX-22986","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T21:06:45Z/"}],"url":"https://support.zabbix.com/browse/ZBX-22986"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2023-29455"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-673b-qsd3-e3hz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96579?format=json","vulnerability_id":"VCID-69kr-fmzb-nbdr","summary":"Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27234","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25637","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25868","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2693","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26983","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27028","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26987","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27031","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2694","published_at":"2026-04-16T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.2776","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3013","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30353","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30271","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30678","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30644","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30467","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27234"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27234","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27234"},{"reference_url":"https://support.zabbix.com/browse/ZBX-26985","reference_id":"ZBX-26985","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-12T15:16:38Z/"}],"url":"https://support.zabbix.com/browse/ZBX-26985"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"}],"aliases":["CVE-2025-27234"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-69kr-fmzb-nbdr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95493?format=json","vulnerability_id":"VCID-6u3x-x7qt-g3fa","summary":"JavaScript preprocessing, webhooks and global scripts can cause uncontrolled CPU, memory, and disk I/O utilization. Preprocessing/webhook/global script configuration and testing are only available to Administrative roles (Admin and Superadmin). Administrative privileges should be typically granted to users who need to perform tasks that require more control over the system. The security risk is limited because not all users have this level of access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29449","reference_id":"","reference_type":"","scores":[{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73212","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73191","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75103","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75087","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75092","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75096","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.7498","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75014","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75026","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75047","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75015","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75051","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75059","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75049","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29449"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29449","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29449"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175","reference_id":"1055175","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"},{"reference_url":"https://support.zabbix.com/browse/ZBX-22589","reference_id":"ZBX-22589","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:25:49Z/"}],"url":"https://support.zabbix.com/browse/ZBX-22589"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2023-29449"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6u3x-x7qt-g3fa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96118?format=json","vulnerability_id":"VCID-7bzf-3c9x-8qc4","summary":"An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36467","reference_id":"","reference_type":"","scores":[{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47359","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47425","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47366","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47339","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.4736","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47363","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47384","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55574","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55633","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.5565","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55627","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55729","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55708","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36467"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36467","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36467"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689","reference_id":"1088689","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25614","reference_id":"ZBX-25614","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-04T04:55:25Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25614"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2024-36467"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7bzf-3c9x-8qc4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96179?format=json","vulnerability_id":"VCID-7f3g-hebk-3qad","summary":"In the src/libs/zbxembed/browser.c file, the es_browser_ctor method retrieves a heap pointer from the Duktape JavaScript engine. This heap pointer is subsequently utilized by the browser_push_error method in the src/libs/zbxembed/browser_error.c file. A use-after-free bug can occur at this stage if the wd->browser heap pointer is freed by garbage collection.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42331","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13466","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13685","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13655","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13557","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13822","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13878","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13679","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13762","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13812","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13781","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13744","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13694","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13605","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13602","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13676","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42331"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42331","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42331"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689","reference_id":"1088689","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25627","reference_id":"ZBX-25627","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:55:25Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25627"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2024-42331"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7f3g-hebk-3qad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96116?format=json","vulnerability_id":"VCID-7yp1-231f-a3eq","summary":"The implementation of atob in \"Zabbix JS\" allows to create a string with arbitrary content and use it to access internal properties of objects.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36463","reference_id":"","reference_type":"","scores":[{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59294","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59354","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59332","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59351","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59297","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59321","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59286","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59336","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59349","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59368","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59352","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59334","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59367","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59373","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36463"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36463","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36463"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25611","reference_id":"ZBX-25611","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-26T16:21:34Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25611"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2024-36463"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7yp1-231f-a3eq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91984?format=json","vulnerability_id":"VCID-854s-ttw2-hqh6","summary":"The node_process_command function in Zabbix Server before 1.8 allows remote attackers to execute arbitrary commands via a crafted request.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4498","reference_id":"","reference_type":"","scores":[{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98726","published_at":"2026-04-01T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98727","published_at":"2026-04-02T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.9873","published_at":"2026-04-04T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98733","published_at":"2026-04-09T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98734","published_at":"2026-04-08T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98736","published_at":"2026-04-12T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98737","published_at":"2026-04-13T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.9874","published_at":"2026-04-16T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98741","published_at":"2026-04-21T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98745","published_at":"2026-04-26T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98747","published_at":"2026-04-29T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98752","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4498"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613","reference_id":"562613","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/20796.rb","reference_id":"CVE-2009-4498;OSVDB-60965","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/20796.rb"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/10432.txt","reference_id":"CVE-2009-4501;CVE-2009-4499;CVE-2009-4498;OSVDB-60968;OSVDB-60966;OSVDB-60965","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/10432.txt"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2009-4498"],"risk_score":1.2,"exploitability":"2.0","weighted_severity":"0.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-854s-ttw2-hqh6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95199?format=json","vulnerability_id":"VCID-8cpy-mqfn-y3f9","summary":"An authenticated user can create a link with reflected Javascript code inside it for the graphs page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35230","reference_id":"","reference_type":"","scores":[{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75357","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75221","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75251","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75229","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75271","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75282","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75302","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.7528","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75269","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75308","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75315","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75306","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75342","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75346","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75349","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35230"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35230","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35230"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014994","reference_id":"1014994","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014994"},{"reference_url":"https://usn.ubuntu.com/6751-1/","reference_id":"USN-6751-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6751-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"}],"aliases":["CVE-2022-35230"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8cpy-mqfn-y3f9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49832?format=json","vulnerability_id":"VCID-8fe6-wr93-xybd","summary":"A vulnerability in Zabbix could allow remote attackers to execute\n    arbitrary shell code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6824","reference_id":"","reference_type":"","scores":[{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80859","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80867","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.8089","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80887","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80915","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80924","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.8094","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80926","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80917","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80952","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80954","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80955","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80976","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80983","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80995","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.81008","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6824"},{"reference_url":"https://security.gentoo.org/glsa/201401-26","reference_id":"GLSA-201401-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2013-6824"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8fe6-wr93-xybd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59473?format=json","vulnerability_id":"VCID-9636-p8at-1keh","summary":"Multiple vulnerabilities have been found in Zabbix, possibly\n    leading to SQL injection attacks, Denial of Service, or information\n    disclosure.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1277","reference_id":"","reference_type":"","scores":[{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81161","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81169","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81193","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.8122","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81226","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81246","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81232","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81225","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81262","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81263","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81284","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81292","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81298","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81313","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1277"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577058","reference_id":"577058","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577058"},{"reference_url":"https://security.gentoo.org/glsa/201311-15","reference_id":"GLSA-201311-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201311-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2010-1277"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9636-p8at-1keh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95198?format=json","vulnerability_id":"VCID-9aju-xvg1-n7e5","summary":"An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35229","reference_id":"","reference_type":"","scores":[{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74271","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74152","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74179","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74151","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74184","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74199","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.7422","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74203","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74196","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74233","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74243","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74234","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74278","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74277","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35229"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014992","reference_id":"1014992","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014992"},{"reference_url":"https://usn.ubuntu.com/6751-1/","reference_id":"USN-6751-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6751-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"}],"aliases":["CVE-2022-35229"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9aju-xvg1-n7e5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91987?format=json","vulnerability_id":"VCID-9meu-vgne-hyg7","summary":"The zbx_get_next_field function in libs/zbxcommon/str.c in Zabbix Server before 1.6.8 allows remote attackers to cause a denial of service (crash) via a request that lacks expected separators, which triggers a NULL pointer dereference, as demonstrated using the Command keyword.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4501","reference_id":"","reference_type":"","scores":[{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89154","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89161","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89176","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89178","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89197","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89201","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89211","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89207","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89205","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89218","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89217","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89213","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89231","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89236","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89239","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89248","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4501"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613","reference_id":"562613","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2009-4501"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9meu-vgne-hyg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94043?format=json","vulnerability_id":"VCID-9t49-tzah-zkhb","summary":"Zabbix through 4.4.0alpha1 allows User Enumeration. With login requests, it is possible to enumerate application usernames based on the variability of server responses (e.g., the \"Login name or password is incorrect\" and \"No permissions for system access\" messages, or just blocking for a number of seconds). This affects both api_jsonrpc.php and index.php.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15132","reference_id":"","reference_type":"","scores":[{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61337","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61413","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61441","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61412","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61459","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61475","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61496","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61483","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64186","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66923","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66938","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66921","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66944","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66958","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66956","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66927","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15132"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935027","reference_id":"935027","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935027"},{"reference_url":"https://usn.ubuntu.com/USN-4767-1/","reference_id":"USN-USN-4767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4767-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995115?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1"}],"aliases":["CVE-2019-15132"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9t49-tzah-zkhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92506?format=json","vulnerability_id":"VCID-9urt-8xcy-v7au","summary":"A File Inclusion vulnerability exists in Zabbix 2.0.6 due to inadequate sanitization of request strings in CGI scripts, which could let a remote malicious user execute arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-3738","reference_id":"","reference_type":"","scores":[{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86175","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86185","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86198","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86199","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86218","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86229","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86243","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86241","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86237","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86254","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86259","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86252","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09146","scoring_system":"epss","scoring_elements":"0.92702","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09146","scoring_system":"epss","scoring_elements":"0.92698","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09146","scoring_system":"epss","scoring_elements":"0.92707","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-3738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3738"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2013-3738"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9urt-8xcy-v7au"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95541?format=json","vulnerability_id":"VCID-9z8h-gg7t-b7f8","summary":"Memory pointer is in a property of the Ducktape object. This leads to multiple vulnerabilities related to direct memory access and manipulation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32724","reference_id":"","reference_type":"","scores":[{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.7255","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72557","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72428","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72446","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72461","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72474","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72496","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72478","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72469","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.7251","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72509","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72552","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72559","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32724"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877","reference_id":"1053877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877"},{"reference_url":"https://support.zabbix.com/browse/ZBX-23391","reference_id":"ZBX-23391","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:43:17Z/"}],"url":"https://support.zabbix.com/browse/ZBX-23391"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2023-32724"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9z8h-gg7t-b7f8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92047?format=json","vulnerability_id":"VCID-a26f-c8an-9ugu","summary":"Multiple cross-site scripting (XSS) vulnerabilities in the formatQuery function in frontends/php/include/classes/class.curl.php in Zabbix before 1.8.3rc1 allow remote attackers to inject arbitrary web script or HTML via the (1) filter_set, (2) show_details, (3) filter_rst, or (4) txt_select parameters to the triggers page (tr_status.php).  NOTE: some of these details are obtained from third party information.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2790","reference_id":"","reference_type":"","scores":[{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63286","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63177","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63236","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63265","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63282","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63317","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.633","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63264","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63301","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63308","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63288","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63307","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6332","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63318","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2790"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2790","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2790"},{"reference_url":"http://secunia.com/advisories/40679","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40679"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/60772","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/60772"},{"reference_url":"https://support.zabbix.com/browse/ZBX-2326","reference_id":"","reference_type":"","scores":[],"url":"https://support.zabbix.com/browse/ZBX-2326"},{"reference_url":"http://www.securityfocus.com/bid/42017","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/42017"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1908","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1908"},{"reference_url":"http://www.zabbix.com/forum/showthread.php?p=68770","reference_id":"","reference_type":"","scores":[],"url":"http://www.zabbix.com/forum/showthread.php?p=68770"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594304","reference_id":"594304","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594304"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2790","reference_id":"CVE-2010-2790","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2790"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2010-2790"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a26f-c8an-9ugu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96178?format=json","vulnerability_id":"VCID-aetr-jrab-6fg5","summary":"The HttpRequest object allows to get the HTTP headers from the server's response after sending the request. The problem is that the returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScript. This allows to create internal strings that can be used to access hidden properties of objects.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42330","reference_id":"","reference_type":"","scores":[{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38183","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38205","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38159","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38249","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38272","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38141","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38191","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38199","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38218","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45612","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45764","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45775","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45716","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45892","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45838","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42330"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42330","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42330"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689","reference_id":"1088689","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25626","reference_id":"ZBX-25626","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:12:32Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25626"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2024-42330"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aetr-jrab-6fg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49461?format=json","vulnerability_id":"VCID-b648-nvxx-hfft","summary":"Multiple vulnerabilities have been found in Zabbix, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4338","reference_id":"","reference_type":"","scores":[{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97565","published_at":"2026-04-01T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97571","published_at":"2026-04-02T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97575","published_at":"2026-04-07T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97581","published_at":"2026-04-08T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97583","published_at":"2026-04-09T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97586","published_at":"2026-04-11T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97588","published_at":"2026-04-13T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97596","published_at":"2026-04-26T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97597","published_at":"2026-04-21T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97595","published_at":"2026-04-24T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.976","published_at":"2026-04-29T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97607","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4338"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823329","reference_id":"823329","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823329"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/39769.txt","reference_id":"CVE-2016-4338","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/39769.txt"},{"reference_url":"https://security.gentoo.org/glsa/201612-42","reference_id":"GLSA-201612-42","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-42"},{"reference_url":"https://usn.ubuntu.com/USN-4767-1/","reference_id":"USN-USN-4767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4767-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050323?format=json","purl":"pkg:deb/debian/zabbix@1:3.0.7%2Bdfsg-1~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:3.0.7%252Bdfsg-1~bpo8%252B1"}],"aliases":["CVE-2016-4338"],"risk_score":0.8,"exploitability":"2.0","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b648-nvxx-hfft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96117?format=json","vulnerability_id":"VCID-b8tm-2187-wkhz","summary":"When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be expected to have access to these passwords.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36464","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15318","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15167","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15252","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15385","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15455","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15258","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15346","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15396","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15356","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20408","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2055","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20547","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20515","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20672","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20663","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36464"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1090030","reference_id":"1090030","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1090030"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25630","reference_id":"ZBX-25630","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:27:15Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25630"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2024-36464"],"risk_score":0.7,"exploitability":"0.5","weighted_severity":"1.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b8tm-2187-wkhz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95950?format=json","vulnerability_id":"VCID-batr-txtv-s3cf","summary":"Setting SMS media allows to set GSM modem file. Later this file is used as Linux device. But due everything is a file for Linux, it is possible to set another file, e.g. log file and zabbix_server will try to communicate with it as modem. As a result, log file will be broken with AT commands and small part for log file content will be leaked to UI.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22123","reference_id":"","reference_type":"","scores":[{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60847","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60826","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60852","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60757","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60786","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60751","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60799","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60815","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60836","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60823","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60804","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61485","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61539","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61534","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22123"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553","reference_id":"1078553","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25013","reference_id":"ZBX-25013","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T14:40:56Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25013"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2024-22123"],"risk_score":0.7,"exploitability":"0.5","weighted_severity":"1.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-batr-txtv-s3cf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85432?format=json","vulnerability_id":"VCID-c2w8-zs9u-z7a9","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2824","reference_id":"","reference_type":"","scores":[{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98794","published_at":"2026-04-01T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98795","published_at":"2026-04-02T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98798","published_at":"2026-04-04T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98801","published_at":"2026-04-09T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98802","published_at":"2026-04-08T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98804","published_at":"2026-04-11T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98805","published_at":"2026-04-12T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98806","published_at":"2026-04-13T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.9881","published_at":"2026-04-16T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98814","published_at":"2026-04-21T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98817","published_at":"2026-04-26T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98818","published_at":"2026-04-29T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98822","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2825"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863584","reference_id":"863584","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863584"},{"reference_url":"https://usn.ubuntu.com/USN-4767-1/","reference_id":"USN-USN-4767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4767-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035771?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.7%2Bdfsg-2%2Bdeb8u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.7%252Bdfsg-2%252Bdeb8u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1050324?format=json","purl":"pkg:deb/debian/zabbix@1:3.0.7%2Bdfsg-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:3.0.7%252Bdfsg-3"}],"aliases":["CVE-2017-2824"],"risk_score":0.3,"exploitability":"0.5","weighted_severity":"0.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c2w8-zs9u-z7a9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92652?format=json","vulnerability_id":"VCID-cbnd-ytgt-dycn","summary":"Multiple SQL injection vulnerabilities in chart_bar.php in the frontend in Zabbix before 1.8.22, 2.0.x before 2.0.14, and 2.2.x before 2.2.8 allow remote attackers to execute arbitrary SQL commands via the (1) itemid or (2) periods parameter.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9450","reference_id":"","reference_type":"","scores":[{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64034","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63887","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63946","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63974","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63933","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63984","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64001","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64013","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63999","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63969","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64004","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64016","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64005","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64024","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64036","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9450"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9450","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9450"},{"reference_url":"http://secunia.com/advisories/61554","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61554"},{"reference_url":"https://support.zabbix.com/browse/ZBX-8582","reference_id":"","reference_type":"","scores":[],"url":"https://support.zabbix.com/browse/ZBX-8582"},{"reference_url":"http://www.zabbix.com/rn1.8.22.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.zabbix.com/rn1.8.22.php"},{"reference_url":"http://www.zabbix.com/rn2.0.14.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.zabbix.com/rn2.0.14.php"},{"reference_url":"http://www.zabbix.com/rn2.2.8.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.zabbix.com/rn2.2.8.php"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774750","reference_id":"774750","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774750"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.10:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.10:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.10:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.11:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.11:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.11:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.11:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.11:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.11:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.12:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.12:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.12:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.13:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.13:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.13:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.2:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.2:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.2:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.3:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.3:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.3:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.4:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.4:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.4:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.5:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.5:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.5:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.6:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.6:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.6:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.7:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.7:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.7:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.8:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.8:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.8:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.8:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.8:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.8:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.9:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.9:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.9:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.9:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.9:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.9:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.2:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.2:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.3:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.3:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.3:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.4:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.4:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.4:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.4:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.5:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.5:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.5:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.6:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.6:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.6:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.7:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.7:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.7:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.7:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.7:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.7:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9450","reference_id":"CVE-2014-9450","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9450"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035770?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.7%2Bdfsg-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.7%252Bdfsg-2"}],"aliases":["CVE-2014-9450"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cbnd-ytgt-dycn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92524?format=json","vulnerability_id":"VCID-cfqn-tsfr-zbce","summary":"Multiple SQL injection vulnerabilities in Zabbix 1.8.x before 1.8.18rc1, 2.0.x before 2.0.9rc1, and 2.1.x before 2.1.7.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5743","reference_id":"","reference_type":"","scores":[{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.98993","published_at":"2026-04-01T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.98995","published_at":"2026-04-02T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.98997","published_at":"2026-04-04T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.98999","published_at":"2026-04-07T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.99","published_at":"2026-04-09T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.99001","published_at":"2026-04-11T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.99002","published_at":"2026-04-12T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.99003","published_at":"2026-04-16T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.99005","published_at":"2026-04-21T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.99008","published_at":"2026-04-24T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.9901","published_at":"2026-04-26T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.99012","published_at":"2026-04-29T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.99016","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5743"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/webapps/28972.rb","reference_id":"CVE-2013-5743;OSVDB-98115","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/webapps/28972.rb"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2013-5743"],"risk_score":1.4,"exploitability":"2.0","weighted_severity":"0.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cfqn-tsfr-zbce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95500?format=json","vulnerability_id":"VCID-cuqx-wxkd-nffa","summary":"Duktape is an 3rd-party embeddable JavaScript engine, with a focus on portability and compact footprint. When adding too many values in valstack JavaScript will crash. This issue occurs due to bug in Duktape 2.6 which is an 3rd-party solution that we use.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29458","reference_id":"","reference_type":"","scores":[{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28309","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28265","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31681","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.3191","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.3183","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32206","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32254","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32284","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32285","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32247","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32216","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32249","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32229","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32199","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32038","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29458"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175","reference_id":"1055175","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"},{"reference_url":"https://support.zabbix.com/browse/ZBX-22989","reference_id":"ZBX-22989","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:19:37Z/"}],"url":"https://support.zabbix.com/browse/ZBX-22989"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2023-29458"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cuqx-wxkd-nffa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95542?format=json","vulnerability_id":"VCID-d7uk-h423-77f5","summary":"The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32726","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32456","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33077","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33109","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3294","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32985","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33016","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33019","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32981","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32956","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32998","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32976","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32939","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32792","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32679","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32596","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32726","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32726"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2023-32726"],"risk_score":1.3,"exploitability":"0.5","weighted_severity":"2.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d7uk-h423-77f5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92572?format=json","vulnerability_id":"VCID-dqkj-n4af-fkhx","summary":"The Frontend in Zabbix before 1.8.20rc2, 2.0.x before 2.0.11rc2, and 2.2.x before 2.2.2rc1 allows remote \"Zabbix Admin\" users to modify the media of arbitrary users via unspecified vectors.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1685","reference_id":"","reference_type":"","scores":[{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60198","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60274","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60332","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60353","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.6034","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60321","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60361","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.6037","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60359","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.6033","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60345","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60333","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60291","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1685"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2014-1685"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dqkj-n4af-fkhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92558?format=json","vulnerability_id":"VCID-f837-pma5-jyha","summary":"Zabbix before 5.0 represents passwords in the users table with unsalted MD5.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7484","reference_id":"","reference_type":"","scores":[{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43403","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43647","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43704","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43728","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43663","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43713","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43716","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43736","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43687","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43749","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43739","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43672","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.4361","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43613","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43532","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7484"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995115?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1"}],"aliases":["CVE-2013-7484"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f837-pma5-jyha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59476?format=json","vulnerability_id":"VCID-fspv-5pb9-dfa5","summary":"Multiple vulnerabilities have been found in Zabbix, possibly\n    leading to SQL injection attacks, Denial of Service, or information\n    disclosure.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4674","reference_id":"","reference_type":"","scores":[{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.5795","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58035","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58057","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58087","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58091","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58107","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58063","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58094","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58095","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58071","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58037","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58051","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58036","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.57994","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4674"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=651225","reference_id":"651225","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=651225"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/18155.txt","reference_id":"CVE-2011-4674;OSVDB-77509","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/18155.txt"},{"reference_url":"https://security.gentoo.org/glsa/201311-15","reference_id":"GLSA-201311-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201311-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2011-4674"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fspv-5pb9-dfa5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95499?format=json","vulnerability_id":"VCID-ftt2-5jnt-9ye2","summary":"Reflected XSS attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script can be activated through Action form fields, which can be sent as request to a website with a vulnerability that enables execution of malicious scripts.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29457","reference_id":"","reference_type":"","scores":[{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58661","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.5864","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65592","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65607","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65591","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65606","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65617","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65616","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65516","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65569","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65581","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65586","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65558","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65594","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29457"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29457","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29457"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175","reference_id":"1055175","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"},{"reference_url":"https://support.zabbix.com/browse/ZBX-22988","reference_id":"ZBX-22988","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T21:06:43Z/"}],"url":"https://support.zabbix.com/browse/ZBX-22988"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2023-29457"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ftt2-5jnt-9ye2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95075?format=json","vulnerability_id":"VCID-gbn9-b2t2-5fbs","summary":"During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23132","reference_id":"","reference_type":"","scores":[{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33739","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34448","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34477","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34386","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34415","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34418","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34379","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34355","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34389","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34375","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34335","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33962","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33943","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33859","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23132"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"}],"aliases":["CVE-2022-23132"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gbn9-b2t2-5fbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92111?format=json","vulnerability_id":"VCID-gj92-45q8-h3ez","summary":"SQL injection vulnerability in events.php in Zabbix 1.8.1 and earlier allows remote attackers to execute arbitrary SQL commands via the nav_time parameter.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-5049","reference_id":"","reference_type":"","scores":[{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65328","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65376","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65402","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65366","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65419","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.6543","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65448","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65435","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65407","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65444","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65454","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.6544","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65456","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65468","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65465","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65445","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-5049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5049"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2010-5049"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gj92-45q8-h3ez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96114?format=json","vulnerability_id":"VCID-gp3f-yz9h-eqax","summary":"The front-end audit log allows viewing of unprotected plaintext passwords, where the passwords are displayed in plain text.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36460","reference_id":"","reference_type":"","scores":[{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63482","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63499","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63508","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63426","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63453","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63418","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.6347","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63487","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63504","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63488","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63454","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63495","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.6348","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36460"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553","reference_id":"1078553","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25017","reference_id":"ZBX-25017","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:04:09Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25017"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2024-36460"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gp3f-yz9h-eqax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92237?format=json","vulnerability_id":"VCID-h73t-dvgp-dbeu","summary":"Multiple cross-site scripting (XSS) vulnerabilities in Zabbix before 1.8.10 allow remote attackers to inject arbitrary web script or HTML via the gname parameter (aka host groups name) to (1) hostgroups.php and (2) usergrps.php, the update action to (3) hosts.php and (4) scripts.php, and (5) maintenance.php.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4615","reference_id":"","reference_type":"","scores":[{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67729","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67762","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67782","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67813","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67828","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67851","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67838","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67801","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67837","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.6785","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67831","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.6786","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67865","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.6784","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4615"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652664","reference_id":"652664","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652664"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2011-4615"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h73t-dvgp-dbeu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59477?format=json","vulnerability_id":"VCID-ju7r-4ugw-k7c7","summary":"Multiple vulnerabilities have been found in Zabbix, possibly\n    leading to SQL injection attacks, Denial of Service, or information\n    disclosure.","references":[{"reference_url":"http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54","reference_id":"","reference_type":"","scores":[],"url":"http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54"},{"reference_url":"http://osvdb.org/84127","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/84127"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3435","reference_id":"","reference_type":"","scores":[{"value":"0.01799","scoring_system":"epss","scoring_elements":"0.8288","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01799","scoring_system":"epss","scoring_elements":"0.82822","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01799","scoring_system":"epss","scoring_elements":"0.82821","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01799","scoring_system":"epss","scoring_elements":"0.82824","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01799","scoring_system":"epss","scoring_elements":"0.82847","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01799","scoring_system":"epss","scoring_elements":"0.82856","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01799","scoring_system":"epss","scoring_elements":"0.82861","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02759","scoring_system":"epss","scoring_elements":"0.85951","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02759","scoring_system":"epss","scoring_elements":"0.86014","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02759","scoring_system":"epss","scoring_elements":"0.85962","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02759","scoring_system":"epss","scoring_elements":"0.85978","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02759","scoring_system":"epss","scoring_elements":"0.85997","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02759","scoring_system":"epss","scoring_elements":"0.86007","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02759","scoring_system":"epss","scoring_elements":"0.86021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02759","scoring_system":"epss","scoring_elements":"0.86019","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3435"},{"reference_url":"http://secunia.com/advisories/49809","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/49809"},{"reference_url":"http://secunia.com/advisories/50475","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50475"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/77195","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/77195"},{"reference_url":"https://support.zabbix.com/browse/ZBX-5348","reference_id":"","reference_type":"","scores":[],"url":"https://support.zabbix.com/browse/ZBX-5348"},{"reference_url":"http://www.debian.org/security/2012/dsa-2539","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2012/dsa-2539"},{"reference_url":"http://www.exploit-db.com/exploits/20087","reference_id":"","reference_type":"","scores":[],"url":"http://www.exploit-db.com/exploits/20087"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/07/27/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/07/27/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/07/28/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/07/28/3"},{"reference_url":"http://www.securityfocus.com/bid/54661","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/54661"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683273","reference_id":"683273","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683273"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.0:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.0:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.0:rc6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:*:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3435","reference_id":"CVE-2012-3435","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3435"},{"reference_url":"https://security.gentoo.org/glsa/201311-15","reference_id":"GLSA-201311-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201311-15"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/20087.py","reference_id":"OSVDB-84127;CVE-2012-3435","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/20087.py"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2012-3435"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ju7r-4ugw-k7c7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95498?format=json","vulnerability_id":"VCID-kx3g-p2zj-duaj","summary":"URL validation scheme receives input from a user and then parses it to identify its various components. The validation scheme can ensure that all URL components comply with internet standards.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29456","reference_id":"","reference_type":"","scores":[{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31519","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31478","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35529","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35989","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35762","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.3573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35643","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36006","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36056","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36074","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36081","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36042","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36016","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36055","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36041","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29456"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175","reference_id":"1055175","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"},{"reference_url":"https://support.zabbix.com/browse/ZBX-22987","reference_id":"ZBX-22987","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:19:48Z/"}],"url":"https://support.zabbix.com/browse/ZBX-22987"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2023-29456"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kx3g-p2zj-duaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95102?format=json","vulnerability_id":"VCID-mggj-rvdd-eqc6","summary":"An authenticated user can create a link with reflected Javascript code inside it for services’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24917","reference_id":"","reference_type":"","scores":[{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53445","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53387","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53413","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53382","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53434","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53429","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53478","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53462","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75485","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75438","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75444","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75433","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75468","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75472","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75477","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24917"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24917","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24917"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"}],"aliases":["CVE-2022-24917"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mggj-rvdd-eqc6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96210?format=json","vulnerability_id":"VCID-mhx5-hcg2-wfc4","summary":"The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaScript payload may be injected into the above endpoint causing it to be executed within the context of the victim's browser.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45699","reference_id":"","reference_type":"","scores":[{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43288","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43496","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.435","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43417","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43591","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43618","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43554","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43605","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.4361","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43629","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43597","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43581","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43642","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43631","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43566","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45699","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45699"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-26254","reference_id":"ZBX-26254","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T16:28:20Z/"}],"url":"https://support.zabbix.com/browse/ZBX-26254"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2024-45699"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mhx5-hcg2-wfc4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96115?format=json","vulnerability_id":"VCID-nrkb-pzcu-8ueg","summary":"Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36461","reference_id":"","reference_type":"","scores":[{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72659","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72662","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72671","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72667","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72536","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72553","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.7253","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72568","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.7258","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72604","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72587","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72576","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72618","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72629","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.7262","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36461"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36461","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36461"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553","reference_id":"1078553","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25018","reference_id":"ZBX-25018","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T15:21:52Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25018"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2024-36461"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nrkb-pzcu-8ueg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94391?format=json","vulnerability_id":"VCID-nvpx-ucxf-xkgt","summary":"Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15803","reference_id":"","reference_type":"","scores":[{"value":"0.02092","scoring_system":"epss","scoring_elements":"0.83966","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02092","scoring_system":"epss","scoring_elements":"0.8398","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02092","scoring_system":"epss","scoring_elements":"0.83995","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02092","scoring_system":"epss","scoring_elements":"0.83998","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02092","scoring_system":"epss","scoring_elements":"0.84021","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02092","scoring_system":"epss","scoring_elements":"0.84028","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02092","scoring_system":"epss","scoring_elements":"0.84045","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02092","scoring_system":"epss","scoring_elements":"0.84038","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02305","scoring_system":"epss","scoring_elements":"0.84748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05067","scoring_system":"epss","scoring_elements":"0.89813","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05067","scoring_system":"epss","scoring_elements":"0.89828","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05067","scoring_system":"epss","scoring_elements":"0.89804","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05067","scoring_system":"epss","scoring_elements":"0.89805","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05067","scoring_system":"epss","scoring_elements":"0.89799","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05067","scoring_system":"epss","scoring_elements":"0.89814","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15803"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966146","reference_id":"966146","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966146"},{"reference_url":"https://usn.ubuntu.com/USN-4767-1/","reference_id":"USN-USN-4767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4767-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995115?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1"}],"aliases":["CVE-2020-15803"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nvpx-ucxf-xkgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59474?format=json","vulnerability_id":"VCID-nxzp-nb57-9fhx","summary":"Multiple vulnerabilities have been found in Zabbix, possibly\n    leading to SQL injection attacks, Denial of Service, or information\n    disclosure.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2904","reference_id":"","reference_type":"","scores":[{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73381","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.7339","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73413","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73385","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73422","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73435","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73459","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73439","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73431","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73474","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73483","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73476","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73509","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73521","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73518","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73512","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2904"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2904","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2904"},{"reference_url":"https://security.gentoo.org/glsa/201311-15","reference_id":"GLSA-201311-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201311-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2011-2904"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nxzp-nb57-9fhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94337?format=json","vulnerability_id":"VCID-p9f4-1jph-qff7","summary":"Zabbix Server 2.2.x and 3.0.x before 3.0.31, and 3.2 allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-11800","reference_id":"","reference_type":"","scores":[{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97687","published_at":"2026-04-01T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97694","published_at":"2026-04-07T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97698","published_at":"2026-04-08T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97701","published_at":"2026-04-09T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97705","published_at":"2026-04-11T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97707","published_at":"2026-04-12T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97708","published_at":"2026-04-13T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97714","published_at":"2026-04-16T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97718","published_at":"2026-04-26T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97717","published_at":"2026-04-24T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97723","published_at":"2026-04-29T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97726","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-11800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11800"},{"reference_url":"https://usn.ubuntu.com/USN-4767-1/","reference_id":"USN-USN-4767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4767-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050325?format=json","purl":"pkg:deb/debian/zabbix@1:4.0.4%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:4.0.4%252Bdfsg-1"}],"aliases":["CVE-2020-11800"],"risk_score":0.2,"exploitability":"0.5","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p9f4-1jph-qff7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96177?format=json","vulnerability_id":"VCID-psak-h1x6-1kca","summary":"Zabbix API user.get returns all users that share common group with the calling user. This includes media and other information, such as login attempts, etc.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42325","reference_id":"","reference_type":"","scores":[{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27756","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28251","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28263","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28245","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28198","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27999","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27921","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28348","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28352","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28309","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31776","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31731","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31594","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31647","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42325"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-26258","reference_id":"ZBX-26258","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:48:54Z/"}],"url":"https://support.zabbix.com/browse/ZBX-26258"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2024-42325"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-psak-h1x6-1kca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95104?format=json","vulnerability_id":"VCID-qhxc-w75p-kqaj","summary":"An authenticated user can create a link with reflected Javascript code inside it for graphs’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24919","reference_id":"","reference_type":"","scores":[{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53445","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53387","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53413","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53382","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53434","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53429","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53478","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53462","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75485","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75438","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75444","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75433","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75468","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75472","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75477","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24919"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"}],"aliases":["CVE-2022-24919"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qhxc-w75p-kqaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95494?format=json","vulnerability_id":"VCID-r65p-6wkq-sfb9","summary":"JavaScript pre-processing can be used by the attacker to gain access to the file system (read-only access on behalf of user \"zabbix\") on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29450","reference_id":"","reference_type":"","scores":[{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.5228","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52428","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52434","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52366","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52376","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52339","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52321","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52374","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52369","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52419","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52403","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52389","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29450"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29450","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29450"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175","reference_id":"1055175","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"},{"reference_url":"https://support.zabbix.com/browse/ZBX-22588","reference_id":"ZBX-22588","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T14:20:54Z/"}],"url":"https://support.zabbix.com/browse/ZBX-22588"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2023-29450"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r65p-6wkq-sfb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92855?format=json","vulnerability_id":"VCID-sssa-fyxz-xfbz","summary":"Zabbix before 2.2.21rc1, 3.x before 3.0.13rc1, 3.1.x and 3.2.x before 3.2.10rc1, and 3.3.x and 3.4.x before 3.4.4rc1 allows open redirect via the request parameter.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10742","reference_id":"","reference_type":"","scores":[{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60306","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.6036","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60212","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60314","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60282","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60332","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60347","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60368","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60355","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60336","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60377","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60385","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60374","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60345","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10742"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html"},{"reference_url":"https://support.zabbix.com/browse/ZBX-10272","reference_id":"","reference_type":"","scores":[],"url":"https://support.zabbix.com/browse/ZBX-10272"},{"reference_url":"https://support.zabbix.com/browse/ZBX-13133","reference_id":"","reference_type":"","scores":[],"url":"https://support.zabbix.com/browse/ZBX-13133"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10742","reference_id":"CVE-2016-10742","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"},{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10742"},{"reference_url":"https://usn.ubuntu.com/USN-4767-1/","reference_id":"USN-USN-4767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4767-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050325?format=json","purl":"pkg:deb/debian/zabbix@1:4.0.4%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:4.0.4%252Bdfsg-1"}],"aliases":["CVE-2016-10742"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sssa-fyxz-xfbz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94694?format=json","vulnerability_id":"VCID-upzh-6yjy-tff3","summary":"In Zabbix from 4.0.x before 4.0.28rc1, 5.0.0alpha1 before 5.0.10rc1, 5.2.x before 5.2.6rc1, and 5.4.0alpha1 before 5.4.0beta2, the CControllerAuthenticationUpdate controller lacks a CSRF protection mechanism. The code inside this controller calls diableSIDValidation inside the init() method. An attacker doesn't have to know Zabbix user login credentials, but has to know the correct Zabbix URL and contact information of an existing user with sufficient privileges.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-27927","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22369","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22271","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22587","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22583","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22533","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22381","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22371","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31691","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34928","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3498","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.35006","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34886","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34931","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3496","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34964","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34781","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-27927"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27927","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27927"},{"reference_url":"https://security.archlinux.org/AVG-1771","reference_id":"AVG-1771","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1771"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995115?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1"}],"aliases":["CVE-2021-27927"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-upzh-6yjy-tff3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95103?format=json","vulnerability_id":"VCID-uu3f-3rbn-9fad","summary":"An authenticated user can create a link with reflected Javascript code inside it for items’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24918","reference_id":"","reference_type":"","scores":[{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76701","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76569","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76598","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76578","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.7661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76621","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76647","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76627","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76617","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76659","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76663","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76651","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76682","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76689","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24918"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"}],"aliases":["CVE-2022-24918"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uu3f-3rbn-9fad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96180?format=json","vulnerability_id":"VCID-uxdf-6tyd-rucd","summary":"The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42332","reference_id":"","reference_type":"","scores":[{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62214","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62259","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62276","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62269","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.6216","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62191","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62158","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62208","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62226","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62244","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62234","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62212","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62258","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62265","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62249","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42332"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689","reference_id":"1088689","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25628","reference_id":"ZBX-25628","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:54:59Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25628"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2024-42332"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uxdf-6tyd-rucd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94076?format=json","vulnerability_id":"VCID-uxf8-8rzq-kfhm","summary":"An issue was discovered in zabbix.php?action=dashboard.view&dashboardid=1 in Zabbix through 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any Username/Password (i.e., anonymously). All created elements (Dashboard/Report/Screen/Map) are accessible by other users and by an admin.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17382","reference_id":"","reference_type":"","scores":[{"value":"0.93689","scoring_system":"epss","scoring_elements":"0.99852","published_at":"2026-04-29T12:55:00Z"},{"value":"0.93689","scoring_system":"epss","scoring_elements":"0.99851","published_at":"2026-05-05T12:55:00Z"},{"value":"0.93689","scoring_system":"epss","scoring_elements":"0.99846","published_at":"2026-04-02T12:55:00Z"},{"value":"0.93689","scoring_system":"epss","scoring_elements":"0.99847","published_at":"2026-04-11T12:55:00Z"},{"value":"0.93689","scoring_system":"epss","scoring_elements":"0.99848","published_at":"2026-04-21T12:55:00Z"},{"value":"0.93689","scoring_system":"epss","scoring_elements":"0.99849","published_at":"2026-04-16T12:55:00Z"},{"value":"0.93689","scoring_system":"epss","scoring_elements":"0.9985","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17382"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"},{"reference_url":"https://www.exploit-db.com/exploits/47467","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/47467"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17382","reference_id":"CVE-2019-17382","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:N"},{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17382"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995115?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1"}],"aliases":["CVE-2019-17382"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uxf8-8rzq-kfhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93205?format=json","vulnerability_id":"VCID-v3cn-k1r9-zkg4","summary":"An information disclosure vulnerability exists in the iConfig proxy request of Zabbix server 2.4.X. A specially crafted iConfig proxy request can cause the Zabbix server to send the configuration information of any Zabbix proxy, resulting in information disclosure. An attacker can make requests from an active Zabbix proxy to trigger this vulnerability.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2826","reference_id":"","reference_type":"","scores":[{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49537","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49567","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49594","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49601","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49595","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49612","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49583","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49584","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49631","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49629","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.496","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49591","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.4956","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49477","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2826"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050325?format=json","purl":"pkg:deb/debian/zabbix@1:4.0.4%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:4.0.4%252Bdfsg-1"}],"aliases":["CVE-2017-2826"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v3cn-k1r9-zkg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85433?format=json","vulnerability_id":"VCID-vq8w-tph7-hfav","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2825","reference_id":"","reference_type":"","scores":[{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70261","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70287","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70136","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70148","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70164","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70141","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70189","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70204","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70227","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70212","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70241","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.7025","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70229","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.7028","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70288","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2825"},{"reference_url":"https://talosintelligence.com/vulnerability_reports/TALOS-2017-0326","reference_id":"","reference_type":"","scores":[],"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2017-0326"},{"reference_url":"https://www.debian.org/security/2017/dsa-3937","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-3937"},{"reference_url":"http://www.securityfocus.com/bid/98094","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/98094"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863584","reference_id":"863584","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863584"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2825","reference_id":"CVE-2017-2825","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2825"},{"reference_url":"https://usn.ubuntu.com/USN-4767-1/","reference_id":"USN-USN-4767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4767-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035771?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.7%2Bdfsg-2%2Bdeb8u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.7%252Bdfsg-2%252Bdeb8u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1050324?format=json","purl":"pkg:deb/debian/zabbix@1:3.0.7%2Bdfsg-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:3.0.7%252Bdfsg-3"}],"aliases":["CVE-2017-2825"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vq8w-tph7-hfav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95946?format=json","vulnerability_id":"VCID-wczj-cv1m-7qce","summary":"An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22116","reference_id":"","reference_type":"","scores":[{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65882","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65899","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.6591","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65908","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65815","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65845","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65811","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65863","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65875","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65894","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65881","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65851","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65886","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65901","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65889","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22116","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22116"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553","reference_id":"1078553","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25016","reference_id":"ZBX-25016","reference_type":"","scores":[{"value":"9.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-04T04:55:28Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25016"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2024-22116"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wczj-cv1m-7qce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95292?format=json","vulnerability_id":"VCID-wfae-uyd7-ybc3","summary":"Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix Frontend while it is being maintained and possible sensitive data will be prevented from being disclosed. An attacker can bypass this protection and access the instance using IP address not listed in the defined range.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-43515","reference_id":"","reference_type":"","scores":[{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31727","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31813","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31684","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.3172","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.3176","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31757","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31857","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31676","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38557","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39644","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39369","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39451","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39465","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39757","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39728","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-43515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43515"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026847","reference_id":"1026847","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026847"},{"reference_url":"https://support.zabbix.com/browse/ZBX-22050","reference_id":"ZBX-22050","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T17:57:56Z/"}],"url":"https://support.zabbix.com/browse/ZBX-22050"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"}],"aliases":["CVE-2022-43515"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wfae-uyd7-ybc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92571?format=json","vulnerability_id":"VCID-x4be-du7g-kuav","summary":"The API in Zabbix before 1.8.20rc1, 2.0.x before 2.0.11rc1, and 2.2.x before 2.2.2rc1 allows remote authenticated users to spoof arbitrary users via the user name in a user.login request.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1682","reference_id":"","reference_type":"","scores":[{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48512","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48547","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48571","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48577","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48573","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48594","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48567","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.4858","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.4863","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48626","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48583","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48568","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48579","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48527","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48443","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1682"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1682"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737818","reference_id":"737818","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737818"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2014-1682"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x4be-du7g-kuav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95540?format=json","vulnerability_id":"VCID-xjj4-u4gj-x7ea","summary":"Request to LDAP is sent before user permissions are checked.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32723","reference_id":"","reference_type":"","scores":[{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31263","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31624","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31497","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31412","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31937","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31979","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31798","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3185","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3188","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31884","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31845","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31809","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31841","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31821","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31792","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32723"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877","reference_id":"1053877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html","reference_id":"msg00012.html","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:43:34Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html"},{"reference_url":"https://support.zabbix.com/browse/ZBX-23230","reference_id":"ZBX-23230","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:43:34Z/"}],"url":"https://support.zabbix.com/browse/ZBX-23230"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995115?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1"}],"aliases":["CVE-2023-32723"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xjj4-u4gj-x7ea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96181?format=json","vulnerability_id":"VCID-zc7p-7yts-5yae","summary":"The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42333","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2673","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26682","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26673","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26866","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26652","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2672","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2677","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26774","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32148","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32371","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32287","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3267","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32641","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42333"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42333","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42333"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689","reference_id":"1088689","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25629","reference_id":"ZBX-25629","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:54:27Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25629"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2024-42333"],"risk_score":0.7,"exploitability":"0.5","weighted_severity":"1.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zc7p-7yts-5yae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91988?format=json","vulnerability_id":"VCID-zemm-yb4a-4bc5","summary":"The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen.  NOTE: this attack is limited to attacks from trusted IP addresses.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4502","reference_id":"","reference_type":"","scores":[{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.98424","published_at":"2026-04-01T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.98427","published_at":"2026-04-02T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.9843","published_at":"2026-04-04T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.98432","published_at":"2026-04-07T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.98435","published_at":"2026-04-08T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.98436","published_at":"2026-04-09T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.98439","published_at":"2026-04-13T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.98443","published_at":"2026-04-16T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.98442","published_at":"2026-04-21T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.98445","published_at":"2026-04-29T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.98446","published_at":"2026-04-26T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.9845","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4502"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4502"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613","reference_id":"562613","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/freebsd/remote/16918.rb","reference_id":"CVE-2009-4502;OSVDB-60956","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/freebsd/remote/16918.rb"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/10431.txt","reference_id":"CVE-2009-4502;OSVDB-60956","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/10431.txt"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035769?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1~bpo70%252B1"}],"aliases":["CVE-2009-4502"],"risk_score":1.2,"exploitability":"2.0","weighted_severity":"0.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zemm-yb4a-4bc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95947?format=json","vulnerability_id":"VCID-zrfp-skzu-cbet","summary":"When a URL is added to the map element, it is recorded in the database with sequential IDs. Upon adding a new URL, the system retrieves the last sysmapelementurlid value and increments it by one. However, an issue arises when a user manually changes the sysmapelementurlid value by adding sysmapelementurlid + 1. This action prevents others from adding URLs to the map element.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22117","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17488","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17698","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17675","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1763","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1797","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18024","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17723","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17811","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17871","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17887","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17844","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17795","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1774","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1775","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17788","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22117"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22117","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22117"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25610","reference_id":"ZBX-25610","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-26T15:03:28Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25610"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994478?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994479?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1~bpo12%2B1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1~bpo12%252B1"}],"aliases":["CVE-2024-22117"],"risk_score":0.7,"exploitability":"0.5","weighted_severity":"1.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zrfp-skzu-cbet"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90715?format=json","vulnerability_id":"VCID-5m6q-rgu8-jyfh","summary":"zabbix file descriptor consumption by authorized hosts","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1353.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1353.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1353","reference_id":"","reference_type":"","scores":[{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90517","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90521","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90532","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90538","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.9055","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90556","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90565","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90564","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90558","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90576","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90575","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90574","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90588","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90584","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90597","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1353"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1353","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1353"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=437848","reference_id":"437848","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=437848"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471678","reference_id":"471678","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471678"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/dos/31403.txt","reference_id":"CVE-2008-1353;OSVDB-42944","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/dos/31403.txt"},{"reference_url":"https://www.securityfocus.com/bid/28244/info","reference_id":"CVE-2008-1353;OSVDB-42944","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/28244/info"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035768?format=json","purl":"pkg:deb/debian/zabbix@1:1.4.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-24sd-pp6s-e3gv"},{"vulnerability":"VCID-2dx4-612r-afcm"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3p27-zs76-b3bg"},{"vulnerability":"VCID-3pw5-bega-j7bg"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-55mr-z77t-xbhh"},{"vulnerability":"VCID-5b6p-zpce-8ygy"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5krc-4z83-cufk"},{"vulnerability":"VCID-5mpe-ycm1-wucw"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-656n-db2u-2bch"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-854s-ttw2-hqh6"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-8fe6-wr93-xybd"},{"vulnerability":"VCID-9636-p8at-1keh"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9meu-vgne-hyg7"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9urt-8xcy-v7au"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-a26f-c8an-9ugu"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cfqn-tsfr-zbce"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dqkj-n4af-fkhx"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-fspv-5pb9-dfa5"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gj92-45q8-h3ez"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-h73t-dvgp-dbeu"},{"vulnerability":"VCID-ju7r-4ugw-k7c7"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-nxzp-nb57-9fhx"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-x4be-du7g-kuav"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zemm-yb4a-4bc5"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.4.6-1"}],"aliases":["CVE-2008-1353"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5m6q-rgu8-jyfh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90700?format=json","vulnerability_id":"VCID-d5vt-7eg9-nyha","summary":"zabbix: root","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6210.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6210.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6210","reference_id":"","reference_type":"","scores":[{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34877","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35074","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35102","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34981","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35026","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35055","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35059","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35023","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35039","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35024","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34977","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34747","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34728","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34638","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34508","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6210"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6210","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6210"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=407181","reference_id":"407181","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=407181"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452682","reference_id":"452682","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452682"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/30839.c","reference_id":"CVE-2007-6210;OSVDB-42480","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/30839.c"},{"reference_url":"https://www.securityfocus.com/bid/26680/info","reference_id":"CVE-2007-6210;OSVDB-42480","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/26680/info"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035768?format=json","purl":"pkg:deb/debian/zabbix@1:1.4.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-18fv-tqjq-p3ce"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-24sd-pp6s-e3gv"},{"vulnerability":"VCID-2dx4-612r-afcm"},{"vulnerability":"VCID-2hd4-rbph-5qd8"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3p27-zs76-b3bg"},{"vulnerability":"VCID-3pw5-bega-j7bg"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-55mr-z77t-xbhh"},{"vulnerability":"VCID-5b6p-zpce-8ygy"},{"vulnerability":"VCID-5dku-ycr7-2uek"},{"vulnerability":"VCID-5krc-4z83-cufk"},{"vulnerability":"VCID-5mpe-ycm1-wucw"},{"vulnerability":"VCID-5r88-rt1s-8ydf"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-656n-db2u-2bch"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-69kr-fmzb-nbdr"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-854s-ttw2-hqh6"},{"vulnerability":"VCID-8cpy-mqfn-y3f9"},{"vulnerability":"VCID-8fe6-wr93-xybd"},{"vulnerability":"VCID-9636-p8at-1keh"},{"vulnerability":"VCID-9aju-xvg1-n7e5"},{"vulnerability":"VCID-9meu-vgne-hyg7"},{"vulnerability":"VCID-9t49-tzah-zkhb"},{"vulnerability":"VCID-9urt-8xcy-v7au"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-a26f-c8an-9ugu"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b648-nvxx-hfft"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-c2w8-zs9u-z7a9"},{"vulnerability":"VCID-cbnd-ytgt-dycn"},{"vulnerability":"VCID-cfqn-tsfr-zbce"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dqkj-n4af-fkhx"},{"vulnerability":"VCID-f837-pma5-jyha"},{"vulnerability":"VCID-fspv-5pb9-dfa5"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-gbn9-b2t2-5fbs"},{"vulnerability":"VCID-gj92-45q8-h3ez"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-h73t-dvgp-dbeu"},{"vulnerability":"VCID-ju7r-4ugw-k7c7"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mggj-rvdd-eqc6"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nvpx-ucxf-xkgt"},{"vulnerability":"VCID-nxzp-nb57-9fhx"},{"vulnerability":"VCID-p9f4-1jph-qff7"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qhxc-w75p-kqaj"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-sssa-fyxz-xfbz"},{"vulnerability":"VCID-upzh-6yjy-tff3"},{"vulnerability":"VCID-uu3f-3rbn-9fad"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-uxf8-8rzq-kfhm"},{"vulnerability":"VCID-v3cn-k1r9-zkg4"},{"vulnerability":"VCID-vq8w-tph7-hfav"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-wfae-uyd7-ybc3"},{"vulnerability":"VCID-x4be-du7g-kuav"},{"vulnerability":"VCID-xjj4-u4gj-x7ea"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zemm-yb4a-4bc5"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.4.6-1"}],"aliases":["CVE-2007-6210"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d5vt-7eg9-nyha"}],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.4.6-1"}