{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","type":"deb","namespace":"debian","name":"zabbix","version":"1:7.0.22+dfsg-1.1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96119?format=json","vulnerability_id":"VCID-172p-q6d5-9ya3","summary":"Execution time for an unsuccessful login differs when using a non-existing username compared to using an existing one.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36469","reference_id":"","reference_type":"","scores":[{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31312","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31823","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31803","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31773","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31606","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31478","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31394","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31244","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31861","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31865","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31826","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31791","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35753","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35726","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35633","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35679","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36469"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-26255","reference_id":"ZBX-26255","reference_type":"","scores":[{"value":"2.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:00:32Z/"}],"url":"https://support.zabbix.com/browse/ZBX-26255"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943888?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.46%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.46%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943886?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-36469"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-172p-q6d5-9ya3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95100?format=json","vulnerability_id":"VCID-18fv-tqjq-p3ce","summary":"An authenticated user can create a link with reflected XSS payload for actions’ pages, and send it to other users. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim. This attack can be implemented with the help of social engineering and expiration of a number of factors - an attacker should have authorized access to the Zabbix Frontend and allowed network connection between a malicious server and victim’s computer, understand attacked infrastructure, be recognized by the victim as a trustee and use trusted communication channel.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24349","reference_id":"","reference_type":"","scores":[{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43854","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43878","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43902","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43832","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43883","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43886","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43904","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43871","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00849","scoring_system":"epss","scoring_elements":"0.74981","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00849","scoring_system":"epss","scoring_elements":"0.74904","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00849","scoring_system":"epss","scoring_elements":"0.74911","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00849","scoring_system":"epss","scoring_elements":"0.74902","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00849","scoring_system":"epss","scoring_elements":"0.74938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00849","scoring_system":"epss","scoring_elements":"0.74945","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00849","scoring_system":"epss","scoring_elements":"0.74948","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00849","scoring_system":"epss","scoring_elements":"0.74955","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24349"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24349","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24349"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943875?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.7%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.7%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2022-24349"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-18fv-tqjq-p3ce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95948?format=json","vulnerability_id":"VCID-1xr6-n296-cyfd","summary":"The cause of vulnerability is improper validation of form input field “Name” on Graph page in Items section.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22119","reference_id":"","reference_type":"","scores":[{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62136","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62133","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62131","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62147","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.6214","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62086","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62042","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62074","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62043","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62093","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.6211","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.6213","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.6212","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62099","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62143","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62149","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22119","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22119"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00020.html","reference_id":"msg00020.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T14:54:06Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00020.html"},{"reference_url":"https://support.zabbix.com/browse/ZBX-24070","reference_id":"ZBX-24070","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T14:54:06Z/"}],"url":"https://support.zabbix.com/browse/ZBX-24070"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943879?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.24%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.24%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-22119"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1xr6-n296-cyfd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92257?format=json","vulnerability_id":"VCID-24sd-pp6s-e3gv","summary":"Cross-site scripting (XSS) vulnerability in ZABBIX before 1.8.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the profiler.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-5027","reference_id":"","reference_type":"","scores":[{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63177","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63236","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63265","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63282","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63317","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.633","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63264","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63301","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63308","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63288","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63307","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6332","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63318","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63286","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63331","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-5027"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5027","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5027"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652664","reference_id":"652664","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652664"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943858?format=json","purl":"pkg:deb/debian/zabbix@1:1.8.10-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.8.10-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2011-5027"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-24sd-pp6s-e3gv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92197?format=json","vulnerability_id":"VCID-2dx4-612r-afcm","summary":"Zabbix before 1.8.6 allows remote attackers to obtain sensitive information via an invalid srcfld2 parameter to popup.php, which reveals the installation path in an error message.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3264","reference_id":"","reference_type":"","scores":[{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63742","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63804","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.6383","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63788","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63839","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63856","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63822","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63857","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63866","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63855","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63872","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63884","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63882","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63853","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63897","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3264"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3264","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3264"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943856?format=json","purl":"pkg:deb/debian/zabbix@1:1.8.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.8.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2011-3264"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2dx4-612r-afcm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95076?format=json","vulnerability_id":"VCID-2hd4-rbph-5qd8","summary":"An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23133","reference_id":"","reference_type":"","scores":[{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76634","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76477","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76489","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76521","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76532","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76558","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76537","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76573","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76577","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76565","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76598","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76603","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76617","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76605","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23133"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943875?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.7%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.7%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2022-23133"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2hd4-rbph-5qd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/204686?format=json","vulnerability_id":"VCID-32c6-6w9k-k3c1","summary":"When the webdriver for the Browser object downloads data from a HTTP server, the data pointer is set to NULL and is allocated only in curl_write_cb when receiving data. If the server's response is an empty document, then wd->data in the code below will remain NULL and an attempt to read from it will result in a crash.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42328","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1374","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13646","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13649","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13865","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13922","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13724","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13806","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13825","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13789","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20666","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2073","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20697","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20593","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20863","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20735","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42328"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1090029","reference_id":"1090029","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1090029"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25624","reference_id":"ZBX-25624","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:56:07Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25624"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943881?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.5%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.5%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-42328"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-32c6-6w9k-k3c1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96211?format=json","vulnerability_id":"VCID-3g1d-2tvh-akh4","summary":"Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attacker can send specially crafted requests to the server, which will cause the server to allocate an excessive amount of memory and perform CPU-intensive decompression operations, ultimately leading to a service crash.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45700","reference_id":"","reference_type":"","scores":[{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41512","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41661","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41583","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41442","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41788","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41817","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41746","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41796","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41805","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41829","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41783","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41832","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41734","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.4166","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45700"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-26253","reference_id":"ZBX-26253","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T16:27:38Z/"}],"url":"https://support.zabbix.com/browse/ZBX-26253"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943888?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.46%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.46%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943889?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.10%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.10%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-45700"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3g1d-2tvh-akh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/267360?format=json","vulnerability_id":"VCID-3ha2-her6-jkfe","summary":"An unauthenticated attacker can exploit the Frontend 'validate' action to blindly instantiate arbitrary PHP classes. The impact depends on environment setup but appears limited at this time.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23923","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22097","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22217","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2191","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22051","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22264","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22048","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22128","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22183","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22204","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22164","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22104","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22103","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28109","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28289","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28211","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28047","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23923"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-27641","reference_id":"ZBX-27641","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:24:53Z/"}],"url":"https://support.zabbix.com/browse/ZBX-27641"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2026-23923"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3ha2-her6-jkfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92198?format=json","vulnerability_id":"VCID-3p27-zs76-b3bg","summary":"popup.php in Zabbix before 1.8.7 allows remote attackers to read the contents of arbitrary database tables via a modified srctbl parameter.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3265","reference_id":"","reference_type":"","scores":[{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66587","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66626","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66652","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66675","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.6669","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66709","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66697","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66667","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66701","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66714","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66699","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66723","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66735","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66732","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66704","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66748","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3265"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943857?format=json","purl":"pkg:deb/debian/zabbix@1:1.8.9-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.8.9-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2011-3265"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3p27-zs76-b3bg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91986?format=json","vulnerability_id":"VCID-3pw5-bega-j7bg","summary":"The process_trap function in trapper/trapper.c in Zabbix Server before 1.6.6 allows remote attackers to cause a denial of service (crash) via a crafted request with data that lacks an expected : (colon) separator, which triggers a NULL pointer dereference.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4500","reference_id":"","reference_type":"","scores":[{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72684","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.7271","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72688","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72727","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.7274","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72764","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72747","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72738","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.7278","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72791","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72782","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72823","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72832","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72829","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72853","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4500"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613","reference_id":"562613","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943853?format=json","purl":"pkg:deb/debian/zabbix@1:1.8-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2009-4500"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3pw5-bega-j7bg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95949?format=json","vulnerability_id":"VCID-3qru-uxsd-e3c8","summary":"Zabbix allows to configure SMS notifications. AT command injection occurs on \"Zabbix Server\" because there is no validation of \"Number\" field on Web nor on Zabbix server side. Attacker can run test of SMS providing specially crafted phone number and execute additional AT commands on modem.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22122","reference_id":"","reference_type":"","scores":[{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.6318","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63158","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63172","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.6317","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.6307","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.631","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63064","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63116","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63133","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.6315","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63135","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63113","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63148","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63136","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22122"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22122","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22122"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553","reference_id":"1078553","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25012","reference_id":"ZBX-25012","reference_type":"","scores":[{"value":"3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T14:46:40Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25012"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943880?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.0%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.0%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-22122"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3qru-uxsd-e3c8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95538?format=json","vulnerability_id":"VCID-464s-8ex9-kqdz","summary":"A stored XSS has been found in the Zabbix web application in the Maps element if a URL field is set with spaces before URL.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32721","reference_id":"","reference_type":"","scores":[{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72324","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72301","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.7234","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72352","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72375","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72358","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72346","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72387","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72397","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72384","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72427","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72436","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72432","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72424","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72454","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32721"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877","reference_id":"1053877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943878?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2023-32721"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-464s-8ex9-kqdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95945?format=json","vulnerability_id":"VCID-4s92-5es4-yka5","summary":"User with no permission to any of the Hosts can access and view host count & other statistics through System Information Widget in Global View Dashboard.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22114","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38637","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38774","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38687","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38564","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.391","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39122","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3904","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39096","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39112","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39124","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39087","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39067","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39092","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39004","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38797","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22114","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22114"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553","reference_id":"1078553","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25015","reference_id":"ZBX-25015","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T12:39:48Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25015"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943880?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.0%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.0%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-22114"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4s92-5es4-yka5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95543?format=json","vulnerability_id":"VCID-4uxg-fxv7-rua8","summary":"An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32727","reference_id":"","reference_type":"","scores":[{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64413","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64302","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64381","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64394","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64368","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64331","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64287","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.6435","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64363","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64351","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64322","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64358","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64369","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.6436","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32727","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32727"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-23857","reference_id":"ZBX-23857","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:37:31Z/"}],"url":"https://support.zabbix.com/browse/ZBX-23857"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943878?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2023-32727"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4uxg-fxv7-rua8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95539?format=json","vulnerability_id":"VCID-547a-p94b-6fep","summary":"The zabbix/src/libs/zbxjson module is vulnerable to a buffer overflow when parsing JSON files via zbx_json_open.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32722","reference_id":"","reference_type":"","scores":[{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57925","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57972","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57969","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57985","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57968","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.5799","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57966","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58022","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58024","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58041","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58019","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57999","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58029","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58028","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58005","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32722"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877","reference_id":"1053877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877"},{"reference_url":"https://support.zabbix.com/browse/ZBX-23390","reference_id":"ZBX-23390","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-18T15:26:49Z/"}],"url":"https://support.zabbix.com/browse/ZBX-23390"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943878?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2023-32722"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-547a-p94b-6fep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91985?format=json","vulnerability_id":"VCID-55mr-z77t-xbhh","summary":"SQL injection vulnerability in the get_history_lastid function in the nodewatcher component in Zabbix Server before 1.6.8 allows remote attackers to execute arbitrary SQL commands via a crafted request, possibly related to the send_history_last_id function in zabbix_server/trapper/nodehistory.c.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4499","reference_id":"","reference_type":"","scores":[{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47559","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47598","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47619","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47568","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47623","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47618","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47642","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47627","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47685","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47677","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.4763","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.4761","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47565","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.4748","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47546","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4499"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613","reference_id":"562613","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943853?format=json","purl":"pkg:deb/debian/zabbix@1:1.8-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2009-4499"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-55mr-z77t-xbhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92427?format=json","vulnerability_id":"VCID-5b6p-zpce-8ygy","summary":"libs/zbxmedia/eztexting.c in Zabbix 1.8.x before 1.8.18rc1, 2.0.x before 2.0.8rc1, and 2.1.x before 2.1.2 does not properly set the CURLOPT_SSL_VERIFYHOST option for libcurl, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6086","reference_id":"","reference_type":"","scores":[{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41267","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.4136","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41389","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41316","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41367","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41374","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41395","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41363","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41392","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.4129","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41178","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41172","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41093","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.40954","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41027","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6086"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6086","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6086"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697443","reference_id":"697443","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697443"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943860?format=json","purl":"pkg:deb/debian/zabbix@1:2.0.7%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.0.7%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2012-6086"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5b6p-zpce-8ygy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81331?format=json","vulnerability_id":"VCID-5dku-ycr7-2uek","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10134","reference_id":"","reference_type":"","scores":[{"value":"0.86228","scoring_system":"epss","scoring_elements":"0.99397","published_at":"2026-04-02T12:55:00Z"},{"value":"0.86228","scoring_system":"epss","scoring_elements":"0.99398","published_at":"2026-04-04T12:55:00Z"},{"value":"0.86228","scoring_system":"epss","scoring_elements":"0.994","published_at":"2026-04-08T12:55:00Z"},{"value":"0.86228","scoring_system":"epss","scoring_elements":"0.99401","published_at":"2026-04-09T12:55:00Z"},{"value":"0.86228","scoring_system":"epss","scoring_elements":"0.99402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.86228","scoring_system":"epss","scoring_elements":"0.99403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.86228","scoring_system":"epss","scoring_elements":"0.99406","published_at":"2026-05-05T12:55:00Z"},{"value":"0.86228","scoring_system":"epss","scoring_elements":"0.99405","published_at":"2026-04-18T12:55:00Z"},{"value":"0.86228","scoring_system":"epss","scoring_elements":"0.99407","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10134"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936","reference_id":"850936","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936"},{"reference_url":"https://usn.ubuntu.com/USN-4767-1/","reference_id":"USN-USN-4767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4767-1/"},{"reference_url":"https://support.zabbix.com/browse/ZBX-11023","reference_id":"ZBX-11023","reference_type":"","scores":[],"url":"https://support.zabbix.com/browse/ZBX-11023"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943868?format=json","purl":"pkg:deb/debian/zabbix@1:3.0.4%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:3.0.4%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2016-10134","ZBX-11023"],"risk_score":1.6,"exploitability":"2.0","weighted_severity":"0.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5dku-ycr7-2uek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59478?format=json","vulnerability_id":"VCID-5krc-4z83-cufk","summary":"Multiple vulnerabilities have been found in Zabbix, possibly\n    leading to SQL injection attacks, Denial of Service, or information\n    disclosure.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1364","reference_id":"","reference_type":"","scores":[{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63156","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63215","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63244","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.6321","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63261","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63279","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.6328","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63282","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63289","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63269","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63287","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63301","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63267","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63311","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1364"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698541","reference_id":"698541","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698541"},{"reference_url":"https://security.gentoo.org/glsa/201311-15","reference_id":"GLSA-201311-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201311-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943861?format=json","purl":"pkg:deb/debian/zabbix@1:2.0.4%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.0.4%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2013-1364"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5krc-4z83-cufk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90715?format=json","vulnerability_id":"VCID-5m6q-rgu8-jyfh","summary":"zabbix file descriptor consumption by authorized hosts","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1353.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1353.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1353","reference_id":"","reference_type":"","scores":[{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90517","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90521","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90532","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90538","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.9055","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90556","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90565","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90564","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90558","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90576","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90575","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90574","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90588","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90584","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90597","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90615","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1353"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1353","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1353"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=437848","reference_id":"437848","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=437848"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471678","reference_id":"471678","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471678"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/dos/31403.txt","reference_id":"CVE-2008-1353;OSVDB-42944","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/dos/31403.txt"},{"reference_url":"https://www.securityfocus.com/bid/28244/info","reference_id":"CVE-2008-1353;OSVDB-42944","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/28244/info"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943851?format=json","purl":"pkg:deb/debian/zabbix@1:1.4.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.4.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2008-1353"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5m6q-rgu8-jyfh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59479?format=json","vulnerability_id":"VCID-5mpe-ycm1-wucw","summary":"Multiple vulnerabilities have been found in Zabbix, possibly\n    leading to SQL injection attacks, Denial of Service, or information\n    disclosure.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5572","reference_id":"","reference_type":"","scores":[{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91946","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91954","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91962","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91968","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91981","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91984","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91987","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91986","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91983","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.92002","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91999","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.91995","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.92","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.92008","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07821","scoring_system":"epss","scoring_elements":"0.92021","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5572"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/36157.rb","reference_id":"CVE-2013-5572;OSVDB-97811","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/36157.rb"},{"reference_url":"https://security.gentoo.org/glsa/201311-15","reference_id":"GLSA-201311-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201311-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943862?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2013-5572"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5mpe-ycm1-wucw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/97015?format=json","vulnerability_id":"VCID-5nmy-hdh8-xbg1","summary":"A low privilege Zabbix user with API access can exploit a blind SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL selects via the sortfield parameter. Although query results are not returned directly, an attacker can exfiltrate arbitrary database data through time-based techniques, potentially leading to session identifier disclosure and administrator account compromise.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23921","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09616","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09722","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09806","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09761","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09772","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09677","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09748","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09798","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09808","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09777","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0976","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09645","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11499","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11508","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11435","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11364","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23921","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23921"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-27640","reference_id":"ZBX-27640","reference_type":"","scores":[{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T19:24:25Z/"}],"url":"https://support.zabbix.com/browse/ZBX-27640"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2026-23921"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5nmy-hdh8-xbg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92598?format=json","vulnerability_id":"VCID-5r88-rt1s-8ydf","summary":"XML external entity (XXE) vulnerability in Zabbix 1.8.x before 1.8.21rc1, 2.0.x before 2.0.13rc1, 2.2.x before 2.2.5rc1, and 2.3.x before 2.3.2 allows remote attackers to read arbitrary files or potentially execute arbitrary code via a crafted DTD in an XML request.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3005","reference_id":"","reference_type":"","scores":[{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88802","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.8881","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88826","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88846","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88851","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88863","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88858","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88872","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.8887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88867","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88884","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88891","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88899","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04287","scoring_system":"epss","scoring_elements":"0.88916","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3005"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751910","reference_id":"751910","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751910"},{"reference_url":"https://usn.ubuntu.com/USN-4767-1/","reference_id":"USN-USN-4767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4767-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943866?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.5%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.5%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2014-3005"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5r88-rt1s-8ydf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95496?format=json","vulnerability_id":"VCID-5s7j-6aea-qucr","summary":"Stored or persistent cross-site scripting (XSS) is a type of XSS where the attacker first sends the payload to the web application, then the application saves the payload (e.g., in a database or server-side text files), and finally, the application unintentionally executes the payload for every victim visiting its web pages.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29454","reference_id":"","reference_type":"","scores":[{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70673","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70654","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74273","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74244","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74253","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74251","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74245","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74126","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74174","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74195","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74177","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.7417","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74208","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74217","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00807","scoring_system":"epss","scoring_elements":"0.74209","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29454"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175","reference_id":"1055175","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"},{"reference_url":"https://support.zabbix.com/browse/ZBX-22985","reference_id":"ZBX-22985","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T21:06:47Z/"}],"url":"https://support.zabbix.com/browse/ZBX-22985"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943878?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2023-29454"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5s7j-6aea-qucr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/267146?format=json","vulnerability_id":"VCID-5t3e-bfve-d3he","summary":"The Zabbix Agent 2 item key smart.disk.get does not sanitize its parameters before passing them to a shell command resulting possible vulnerability for remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32728","reference_id":"","reference_type":"","scores":[{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67536","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67419","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67517","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67518","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67492","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67441","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.6742","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67471","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67485","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67508","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67495","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67461","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67497","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67509","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67487","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67506","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32728"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-23858","reference_id":"ZBX-23858","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T20:43:15Z/"}],"url":"https://support.zabbix.com/browse/ZBX-23858"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943879?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.24%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.24%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2023-32728"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5t3e-bfve-d3he"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59475?format=json","vulnerability_id":"VCID-656n-db2u-2bch","summary":"Multiple vulnerabilities have been found in Zabbix, possibly\n    leading to SQL injection attacks, Denial of Service, or information\n    disclosure.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3263","reference_id":"","reference_type":"","scores":[{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64802","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64852","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64842","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64892","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64924","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64914","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64886","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64923","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64933","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64917","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64936","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64949","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64945","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64926","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64974","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3263"},{"reference_url":"https://security.gentoo.org/glsa/201311-15","reference_id":"GLSA-201311-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201311-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943856?format=json","purl":"pkg:deb/debian/zabbix@1:1.8.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.8.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2011-3263"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-656n-db2u-2bch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95497?format=json","vulnerability_id":"VCID-673b-qsd3-e3hz","summary":"Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script is activated through a link, which sends a request to a website with a vulnerability that enables execution of malicious scripts.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29455","reference_id":"","reference_type":"","scores":[{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75899","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00917","scoring_system":"epss","scoring_elements":"0.75866","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.7917","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79114","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79121","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79136","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79149","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79028","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79052","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79059","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79083","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79068","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79058","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79082","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01219","scoring_system":"epss","scoring_elements":"0.79081","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29455"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29455","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29455"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175","reference_id":"1055175","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"},{"reference_url":"https://support.zabbix.com/browse/ZBX-22986","reference_id":"ZBX-22986","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T21:06:45Z/"}],"url":"https://support.zabbix.com/browse/ZBX-22986"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943878?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2023-29455"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-673b-qsd3-e3hz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96579?format=json","vulnerability_id":"VCID-69kr-fmzb-nbdr","summary":"Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. In Zabbix 5.0 this allows for remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27234","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25637","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25868","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2693","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26983","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27028","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26987","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27031","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2694","published_at":"2026-04-16T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.2776","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.302","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30271","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3013","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30678","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30644","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30467","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30353","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27234"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27234","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27234"},{"reference_url":"https://support.zabbix.com/browse/ZBX-26985","reference_id":"ZBX-26985","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-12T15:16:38Z/"}],"url":"https://support.zabbix.com/browse/ZBX-26985"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943890?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.47%2Bdfsg-0%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.47%252Bdfsg-0%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943875?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.7%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.7%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2025-27234"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-69kr-fmzb-nbdr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95493?format=json","vulnerability_id":"VCID-6u3x-x7qt-g3fa","summary":"JavaScript preprocessing, webhooks and global scripts can cause uncontrolled CPU, memory, and disk I/O utilization. Preprocessing/webhook/global script configuration and testing are only available to Administrative roles (Admin and Superadmin). Administrative privileges should be typically granted to users who need to perform tasks that require more control over the system. The security risk is limited because not all users have this level of access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29449","reference_id":"","reference_type":"","scores":[{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73212","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73191","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.7513","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75092","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75096","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75103","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.7498","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75014","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75026","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75047","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75015","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75051","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75059","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75049","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0086","scoring_system":"epss","scoring_elements":"0.75087","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29449"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29449","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29449"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175","reference_id":"1055175","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"},{"reference_url":"https://support.zabbix.com/browse/ZBX-22589","reference_id":"ZBX-22589","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:25:49Z/"}],"url":"https://support.zabbix.com/browse/ZBX-22589"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943878?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2023-29449"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6u3x-x7qt-g3fa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/259387?format=json","vulnerability_id":"VCID-76qf-8jm4-8kct","summary":"Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to \"Audit Log\". Due to \"clientip\" field is not sanitized, it is possible to injection SQL into \"clientip\" and exploit time based blind SQL injection.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22120","reference_id":"","reference_type":"","scores":[{"value":"0.92119","scoring_system":"epss","scoring_elements":"0.99714","published_at":"2026-04-24T12:55:00Z"},{"value":"0.92119","scoring_system":"epss","scoring_elements":"0.99717","published_at":"2026-05-07T12:55:00Z"},{"value":"0.92119","scoring_system":"epss","scoring_elements":"0.99715","published_at":"2026-04-29T12:55:00Z"},{"value":"0.92259","scoring_system":"epss","scoring_elements":"0.99719","published_at":"2026-04-18T12:55:00Z"},{"value":"0.92259","scoring_system":"epss","scoring_elements":"0.99721","published_at":"2026-04-21T12:55:00Z"},{"value":"0.92259","scoring_system":"epss","scoring_elements":"0.99718","published_at":"2026-04-13T12:55:00Z"},{"value":"0.92259","scoring_system":"epss","scoring_elements":"0.99716","published_at":"2026-04-02T12:55:00Z"},{"value":"0.92259","scoring_system":"epss","scoring_elements":"0.99717","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22120"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1072120","reference_id":"1072120","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1072120"},{"reference_url":"https://support.zabbix.com/browse/ZBX-24505","reference_id":"ZBX-24505","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-20T13:29:40Z/"}],"url":"https://support.zabbix.com/browse/ZBX-24505"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943882?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.29%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.29%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-22120"],"risk_score":9.0,"exploitability":"2.0","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-76qf-8jm4-8kct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96118?format=json","vulnerability_id":"VCID-7bzf-3c9x-8qc4","summary":"An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36467","reference_id":"","reference_type":"","scores":[{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47359","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47425","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47366","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47339","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.4736","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47363","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47384","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55621","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.5565","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55627","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55574","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55729","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55708","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55633","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36467"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36467","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36467"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689","reference_id":"1088689","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25614","reference_id":"ZBX-25614","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-04T04:55:25Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25614"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943887?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-36467"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7bzf-3c9x-8qc4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96179?format=json","vulnerability_id":"VCID-7f3g-hebk-3qad","summary":"In the src/libs/zbxembed/browser.c file, the es_browser_ctor method retrieves a heap pointer from the Duktape JavaScript engine. This heap pointer is subsequently utilized by the browser_push_error method in the src/libs/zbxembed/browser_error.c file. A use-after-free bug can occur at this stage if the wd->browser heap pointer is freed by garbage collection.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42331","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13622","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13655","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13557","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13466","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13822","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13878","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13679","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13762","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13812","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13781","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13744","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13694","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13605","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13602","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13676","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13685","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42331"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42331","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42331"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689","reference_id":"1088689","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25627","reference_id":"ZBX-25627","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:55:25Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25627"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943885?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.45%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.45%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943881?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.5%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.5%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-42331"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7f3g-hebk-3qad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96116?format=json","vulnerability_id":"VCID-7yp1-231f-a3eq","summary":"The implementation of atob in \"Zabbix JS\" allows to create a string with arbitrary content and use it to access internal properties of objects.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36463","reference_id":"","reference_type":"","scores":[{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59343","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59332","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59351","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59294","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59297","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59321","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59286","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59336","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59349","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59368","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59352","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59334","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59367","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59354","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36463"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36463","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36463"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25611","reference_id":"ZBX-25611","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-26T16:21:34Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25611"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943884?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.3%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.3%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-36463"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7yp1-231f-a3eq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91984?format=json","vulnerability_id":"VCID-854s-ttw2-hqh6","summary":"The node_process_command function in Zabbix Server before 1.8 allows remote attackers to execute arbitrary commands via a crafted request.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4498","reference_id":"","reference_type":"","scores":[{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98726","published_at":"2026-04-01T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98727","published_at":"2026-04-02T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.9873","published_at":"2026-04-04T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98733","published_at":"2026-04-09T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98734","published_at":"2026-04-08T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98736","published_at":"2026-04-12T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98737","published_at":"2026-04-13T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.9874","published_at":"2026-04-16T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98741","published_at":"2026-04-21T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98745","published_at":"2026-04-26T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98747","published_at":"2026-04-29T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98752","published_at":"2026-05-05T12:55:00Z"},{"value":"0.71776","scoring_system":"epss","scoring_elements":"0.98753","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4498"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613","reference_id":"562613","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/20796.rb","reference_id":"CVE-2009-4498;OSVDB-60965","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/20796.rb"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/10432.txt","reference_id":"CVE-2009-4501;CVE-2009-4499;CVE-2009-4498;OSVDB-60968;OSVDB-60966;OSVDB-60965","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/10432.txt"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943853?format=json","purl":"pkg:deb/debian/zabbix@1:1.8-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2009-4498"],"risk_score":1.2,"exploitability":"2.0","weighted_severity":"0.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-854s-ttw2-hqh6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95199?format=json","vulnerability_id":"VCID-8cpy-mqfn-y3f9","summary":"An authenticated user can create a link with reflected Javascript code inside it for the graphs page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35230","reference_id":"","reference_type":"","scores":[{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75386","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75221","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75251","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75229","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75271","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75282","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75302","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.7528","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75269","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75308","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75315","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75306","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75342","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75346","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75349","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00874","scoring_system":"epss","scoring_elements":"0.75357","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35230"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35230","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35230"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014994","reference_id":"1014994","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014994"},{"reference_url":"https://usn.ubuntu.com/6751-1/","reference_id":"USN-6751-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6751-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943875?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.7%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.7%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2022-35230"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8cpy-mqfn-y3f9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49832?format=json","vulnerability_id":"VCID-8fe6-wr93-xybd","summary":"A vulnerability in Zabbix could allow remote attackers to execute\n    arbitrary shell code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6824","reference_id":"","reference_type":"","scores":[{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80859","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80867","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.8089","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80887","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80915","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80924","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.8094","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80926","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80917","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80952","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80954","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80955","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80976","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80983","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.80995","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.81008","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01469","scoring_system":"epss","scoring_elements":"0.81031","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6824"},{"reference_url":"https://security.gentoo.org/glsa/201401-26","reference_id":"GLSA-201401-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-26"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943864?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.0%2Bdfsg-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.0%252Bdfsg-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2013-6824"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8fe6-wr93-xybd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/204210?format=json","vulnerability_id":"VCID-8yyv-6phn-tkaq","summary":"The webdriver for the Browser object expects an error object to be initialized when the webdriver_session_query function fails. But this function can fail for various reasons without an error description and then the wd->error will be NULL and trying to read from it will result in a crash.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42329","reference_id":"","reference_type":"","scores":[{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11103","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11094","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1103","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10965","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11296","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11111","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11191","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11247","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11258","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11225","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11063","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11072","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11203","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11139","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42329"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689","reference_id":"1088689","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25625","reference_id":"ZBX-25625","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:55:49Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25625"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943881?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.5%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.5%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-42329"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8yyv-6phn-tkaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59473?format=json","vulnerability_id":"VCID-9636-p8at-1keh","summary":"Multiple vulnerabilities have been found in Zabbix, possibly\n    leading to SQL injection attacks, Denial of Service, or information\n    disclosure.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1277","reference_id":"","reference_type":"","scores":[{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81161","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81169","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81193","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.8122","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81226","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81246","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81232","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81225","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81262","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81263","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81284","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81292","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81298","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81313","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01516","scoring_system":"epss","scoring_elements":"0.81332","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1277"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577058","reference_id":"577058","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=577058"},{"reference_url":"https://security.gentoo.org/glsa/201311-15","reference_id":"GLSA-201311-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201311-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943854?format=json","purl":"pkg:deb/debian/zabbix@1:1.8.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.8.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2010-1277"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9636-p8at-1keh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95198?format=json","vulnerability_id":"VCID-9aju-xvg1-n7e5","summary":"An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35229","reference_id":"","reference_type":"","scores":[{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74298","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74152","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74179","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74151","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74184","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74199","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.7422","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74203","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74196","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74233","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74243","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74234","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74278","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74277","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00808","scoring_system":"epss","scoring_elements":"0.74271","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35229"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35229","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35229"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014992","reference_id":"1014992","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014992"},{"reference_url":"https://usn.ubuntu.com/6751-1/","reference_id":"USN-6751-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6751-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943875?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.7%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.7%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2022-35229"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9aju-xvg1-n7e5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/204691?format=json","vulnerability_id":"VCID-9jfn-6nvg-a3b6","summary":"A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42327","reference_id":"","reference_type":"","scores":[{"value":"0.90724","scoring_system":"epss","scoring_elements":"0.99621","published_at":"2026-04-07T12:55:00Z"},{"value":"0.90724","scoring_system":"epss","scoring_elements":"0.99623","published_at":"2026-04-16T12:55:00Z"},{"value":"0.90724","scoring_system":"epss","scoring_elements":"0.99622","published_at":"2026-04-09T12:55:00Z"},{"value":"0.90724","scoring_system":"epss","scoring_elements":"0.99619","published_at":"2026-04-02T12:55:00Z"},{"value":"0.90724","scoring_system":"epss","scoring_elements":"0.9962","published_at":"2026-04-04T12:55:00Z"},{"value":"0.91356","scoring_system":"epss","scoring_elements":"0.99667","published_at":"2026-05-07T12:55:00Z"},{"value":"0.91356","scoring_system":"epss","scoring_elements":"0.99664","published_at":"2026-04-26T12:55:00Z"},{"value":"0.91356","scoring_system":"epss","scoring_elements":"0.99665","published_at":"2026-04-29T12:55:00Z"},{"value":"0.91356","scoring_system":"epss","scoring_elements":"0.99666","published_at":"2026-05-05T12:55:00Z"},{"value":"0.91356","scoring_system":"epss","scoring_elements":"0.9966","published_at":"2026-04-18T12:55:00Z"},{"value":"0.91356","scoring_system":"epss","scoring_elements":"0.99661","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42327"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689","reference_id":"1088689","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/52230.py","reference_id":"CVE-2024-42327","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/52230.py"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25623","reference_id":"ZBX-25623","reference_type":"","scores":[{"value":"9.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:10:31Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25623"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943883?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-42327"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9jfn-6nvg-a3b6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91987?format=json","vulnerability_id":"VCID-9meu-vgne-hyg7","summary":"The zbx_get_next_field function in libs/zbxcommon/str.c in Zabbix Server before 1.6.8 allows remote attackers to cause a denial of service (crash) via a request that lacks expected separators, which triggers a NULL pointer dereference, as demonstrated using the Command keyword.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4501","reference_id":"","reference_type":"","scores":[{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89154","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89161","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89176","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89178","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89197","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89201","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89211","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89207","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89205","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89218","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89217","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89213","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89231","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89236","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89239","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89248","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04567","scoring_system":"epss","scoring_elements":"0.89264","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4501"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613","reference_id":"562613","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943853?format=json","purl":"pkg:deb/debian/zabbix@1:1.8-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2009-4501"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9meu-vgne-hyg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94043?format=json","vulnerability_id":"VCID-9t49-tzah-zkhb","summary":"Zabbix through 4.4.0alpha1 allows User Enumeration. With login requests, it is possible to enumerate application usernames based on the variability of server responses (e.g., the \"Login name or password is incorrect\" and \"No permissions for system access\" messages, or just blocking for a number of seconds). This affects both api_jsonrpc.php and index.php.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15132","reference_id":"","reference_type":"","scores":[{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61337","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61413","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61441","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61412","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61459","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61475","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61496","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61483","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64186","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66923","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66938","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66921","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66944","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66958","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66956","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66927","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66969","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15132"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935027","reference_id":"935027","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935027"},{"reference_url":"https://usn.ubuntu.com/USN-4767-1/","reference_id":"USN-USN-4767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4767-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943873?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.7%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.7%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2019-15132"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9t49-tzah-zkhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92506?format=json","vulnerability_id":"VCID-9urt-8xcy-v7au","summary":"A File Inclusion vulnerability exists in Zabbix 2.0.6 due to inadequate sanitization of request strings in CGI scripts, which could let a remote malicious user execute arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-3738","reference_id":"","reference_type":"","scores":[{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86175","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86185","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86198","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86199","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86218","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86229","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86243","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86241","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86237","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86254","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86259","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02855","scoring_system":"epss","scoring_elements":"0.86252","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09146","scoring_system":"epss","scoring_elements":"0.92702","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09146","scoring_system":"epss","scoring_elements":"0.92698","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09146","scoring_system":"epss","scoring_elements":"0.92707","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09146","scoring_system":"epss","scoring_elements":"0.9272","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-3738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3738"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943860?format=json","purl":"pkg:deb/debian/zabbix@1:2.0.7%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.0.7%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2013-3738"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9urt-8xcy-v7au"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95541?format=json","vulnerability_id":"VCID-9z8h-gg7t-b7f8","summary":"Memory pointer is in a property of the Ducktape object. This leads to multiple vulnerabilities related to direct memory access and manipulation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32724","reference_id":"","reference_type":"","scores":[{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72579","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.7255","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72428","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72446","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72461","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72474","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72496","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72478","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72469","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.7251","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72509","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72552","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72559","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0072","scoring_system":"epss","scoring_elements":"0.72557","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32724"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877","reference_id":"1053877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877"},{"reference_url":"https://support.zabbix.com/browse/ZBX-23391","reference_id":"ZBX-23391","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:43:17Z/"}],"url":"https://support.zabbix.com/browse/ZBX-23391"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943878?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2023-32724"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9z8h-gg7t-b7f8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/267081?format=json","vulnerability_id":"VCID-a13m-gsde-jyf3","summary":"An unauthenticated user can create a link with reflected Javascript code inside the backurl parameter and send it to other authenticated users in order to create a fake account with predefined login, password and role in Zabbix Frontend.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-40626","reference_id":"","reference_type":"","scores":[{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83202","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83028","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83042","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.8304","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83064","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83072","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83088","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83082","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83077","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83116","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83118","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83141","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83149","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.83156","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01866","scoring_system":"epss","scoring_elements":"0.8318","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-40626"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943875?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.7%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.7%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2022-40626"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a13m-gsde-jyf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92047?format=json","vulnerability_id":"VCID-a26f-c8an-9ugu","summary":"Multiple cross-site scripting (XSS) vulnerabilities in the formatQuery function in frontends/php/include/classes/class.curl.php in Zabbix before 1.8.3rc1 allow remote attackers to inject arbitrary web script or HTML via the (1) filter_set, (2) show_details, (3) filter_rst, or (4) txt_select parameters to the triggers page (tr_status.php).  NOTE: some of these details are obtained from third party information.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2790","reference_id":"","reference_type":"","scores":[{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63331","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63177","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63236","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63265","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63282","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63317","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.633","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63264","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63301","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63308","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63288","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63307","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6332","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63318","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63286","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2790"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2790","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2790"},{"reference_url":"http://secunia.com/advisories/40679","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40679"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/60772","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/60772"},{"reference_url":"https://support.zabbix.com/browse/ZBX-2326","reference_id":"","reference_type":"","scores":[],"url":"https://support.zabbix.com/browse/ZBX-2326"},{"reference_url":"http://www.securityfocus.com/bid/42017","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/42017"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1908","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1908"},{"reference_url":"http://www.zabbix.com/forum/showthread.php?p=68770","reference_id":"","reference_type":"","scores":[],"url":"http://www.zabbix.com/forum/showthread.php?p=68770"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594304","reference_id":"594304","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594304"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2790","reference_id":"CVE-2010-2790","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2790"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943855?format=json","purl":"pkg:deb/debian/zabbix@1:1.8.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.8.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2010-2790"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a26f-c8an-9ugu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96178?format=json","vulnerability_id":"VCID-aetr-jrab-6fg5","summary":"The HttpRequest object allows to get the HTTP headers from the server's response after sending the request. The problem is that the returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScript. This allows to create internal strings that can be used to access hidden properties of objects.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42330","reference_id":"","reference_type":"","scores":[{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38183","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38205","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38159","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38249","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38272","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38141","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38191","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38199","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38218","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45674","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45775","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45716","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45612","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45892","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45838","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45764","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42330"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42330","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42330"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689","reference_id":"1088689","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25626","reference_id":"ZBX-25626","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:12:32Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25626"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943885?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.45%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.45%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943881?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.5%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.5%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-42330"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aetr-jrab-6fg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49461?format=json","vulnerability_id":"VCID-b648-nvxx-hfft","summary":"Multiple vulnerabilities have been found in Zabbix, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4338","reference_id":"","reference_type":"","scores":[{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97565","published_at":"2026-04-01T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97571","published_at":"2026-04-02T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97575","published_at":"2026-04-07T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97581","published_at":"2026-04-08T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97583","published_at":"2026-04-09T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97586","published_at":"2026-04-11T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97588","published_at":"2026-04-13T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97596","published_at":"2026-04-26T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97597","published_at":"2026-04-21T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97595","published_at":"2026-04-24T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.976","published_at":"2026-04-29T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97607","published_at":"2026-05-05T12:55:00Z"},{"value":"0.4496","scoring_system":"epss","scoring_elements":"0.97612","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4338"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823329","reference_id":"823329","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823329"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/39769.txt","reference_id":"CVE-2016-4338","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/39769.txt"},{"reference_url":"https://security.gentoo.org/glsa/201612-42","reference_id":"GLSA-201612-42","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-42"},{"reference_url":"https://usn.ubuntu.com/USN-4767-1/","reference_id":"USN-USN-4767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4767-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943870?format=json","purl":"pkg:deb/debian/zabbix@1:3.0.3%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:3.0.3%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2016-4338"],"risk_score":0.8,"exploitability":"2.0","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b648-nvxx-hfft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/204484?format=json","vulnerability_id":"VCID-b6xv-kz4p-k3em","summary":"There was discovered a use after free bug in browser.c in the es_browser_get_variant function","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42326","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22213","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22153","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22152","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22271","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22313","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22098","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22181","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22235","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22254","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27164","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27347","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.2727","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.271","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27535","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27496","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27451","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689","reference_id":"1088689","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25622","reference_id":"ZBX-25622","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:56:46Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25622"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943881?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.5%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.5%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-42326"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b6xv-kz4p-k3em"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96117?format=json","vulnerability_id":"VCID-b8tm-2187-wkhz","summary":"When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be expected to have access to these passwords.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36464","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15318","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15167","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15252","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15385","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15455","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15258","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15346","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15396","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15356","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20479","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20547","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20515","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20408","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20672","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20663","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2055","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36464"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1090030","reference_id":"1090030","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1090030"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25630","reference_id":"ZBX-25630","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:27:15Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25630"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943885?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.45%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.45%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943886?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-36464"],"risk_score":0.7,"exploitability":"0.5","weighted_severity":"1.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b8tm-2187-wkhz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95950?format=json","vulnerability_id":"VCID-batr-txtv-s3cf","summary":"Setting SMS media allows to set GSM modem file. Later this file is used as Linux device. But due everything is a file for Linux, it is possible to set another file, e.g. log file and zabbix_server will try to communicate with it as modem. As a result, log file will be broken with AT commands and small part for log file content will be leaked to UI.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22123","reference_id":"","reference_type":"","scores":[{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60847","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60826","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60852","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60757","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60786","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60751","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60799","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60815","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60836","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60823","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60804","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61485","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61539","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61534","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22123"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553","reference_id":"1078553","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25013","reference_id":"ZBX-25013","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T14:40:56Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25013"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943880?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.0%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.0%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-22123"],"risk_score":0.7,"exploitability":"0.5","weighted_severity":"1.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-batr-txtv-s3cf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85432?format=json","vulnerability_id":"VCID-c2w8-zs9u-z7a9","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2824","reference_id":"","reference_type":"","scores":[{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98794","published_at":"2026-04-01T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98795","published_at":"2026-04-02T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98798","published_at":"2026-04-04T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98801","published_at":"2026-04-09T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98802","published_at":"2026-04-08T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98804","published_at":"2026-04-11T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98805","published_at":"2026-04-12T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98806","published_at":"2026-04-13T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.9881","published_at":"2026-04-16T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98814","published_at":"2026-04-21T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98817","published_at":"2026-04-26T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98818","published_at":"2026-04-29T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98822","published_at":"2026-05-05T12:55:00Z"},{"value":"0.73548","scoring_system":"epss","scoring_elements":"0.98823","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2825"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863584","reference_id":"863584","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863584"},{"reference_url":"https://usn.ubuntu.com/USN-4767-1/","reference_id":"USN-USN-4767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4767-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943871?format=json","purl":"pkg:deb/debian/zabbix@1:3.0.7%2Bdfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:3.0.7%252Bdfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2017-2824"],"risk_score":0.3,"exploitability":"0.5","weighted_severity":"0.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c2w8-zs9u-z7a9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92652?format=json","vulnerability_id":"VCID-cbnd-ytgt-dycn","summary":"Multiple SQL injection vulnerabilities in chart_bar.php in the frontend in Zabbix before 1.8.22, 2.0.x before 2.0.14, and 2.2.x before 2.2.8 allow remote attackers to execute arbitrary SQL commands via the (1) itemid or (2) periods parameter.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9450","reference_id":"","reference_type":"","scores":[{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63887","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63946","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63974","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63933","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63984","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64001","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64013","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63999","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63969","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64004","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64016","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64005","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64024","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64036","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64034","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9450"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9450","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9450"},{"reference_url":"http://secunia.com/advisories/61554","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61554"},{"reference_url":"https://support.zabbix.com/browse/ZBX-8582","reference_id":"","reference_type":"","scores":[],"url":"https://support.zabbix.com/browse/ZBX-8582"},{"reference_url":"http://www.zabbix.com/rn1.8.22.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.zabbix.com/rn1.8.22.php"},{"reference_url":"http://www.zabbix.com/rn2.0.14.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.zabbix.com/rn2.0.14.php"},{"reference_url":"http://www.zabbix.com/rn2.2.8.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.zabbix.com/rn2.2.8.php"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774750","reference_id":"774750","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774750"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.10:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.10:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.10:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.11:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.11:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.11:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.11:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.11:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.11:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.12:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.12:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.12:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.12:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.13:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.13:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.13:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.2:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.2:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.2:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.3:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.3:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.3:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.4:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.4:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.4:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.5:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.5:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.5:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.6:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.6:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.6:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.7:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.7:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.7:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.8:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.8:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.8:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.8:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.8:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.8:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.9:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.9:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.9:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.9:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.9:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.9:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.2:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.2:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.2:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.2:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.3:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.3:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.3:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.4:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.4:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.4:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.4:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.4:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.5:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.5:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.5:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.6:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.6:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.6:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.7:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.7:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.7:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.7:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.2.7:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.2.7:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9450","reference_id":"CVE-2014-9450","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9450"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943867?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.7%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.7%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2014-9450"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cbnd-ytgt-dycn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95495?format=json","vulnerability_id":"VCID-cdyd-79m9-pyhv","summary":"Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g., \"var a = {{.}}\"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template. Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29453","reference_id":"","reference_type":"","scores":[{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68354","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68311","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68207","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68225","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68252","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68267","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68293","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.6828","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68246","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68286","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68297","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68277","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.6832","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68329","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68334","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29453"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29453","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29453"},{"reference_url":"https://support.zabbix.com/browse/ZBX-23388","reference_id":"ZBX-23388","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-18T15:17:42Z/"}],"url":"https://support.zabbix.com/browse/ZBX-23388"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943878?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2023-29453"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cdyd-79m9-pyhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92524?format=json","vulnerability_id":"VCID-cfqn-tsfr-zbce","summary":"Multiple SQL injection vulnerabilities in Zabbix 1.8.x before 1.8.18rc1, 2.0.x before 2.0.9rc1, and 2.1.x before 2.1.7.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5743","reference_id":"","reference_type":"","scores":[{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.98993","published_at":"2026-04-01T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.98995","published_at":"2026-04-02T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.98997","published_at":"2026-04-04T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.98999","published_at":"2026-04-07T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.99","published_at":"2026-04-09T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.99001","published_at":"2026-04-11T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.99002","published_at":"2026-04-12T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.99003","published_at":"2026-04-16T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.99005","published_at":"2026-04-21T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.99008","published_at":"2026-04-24T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.9901","published_at":"2026-04-26T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.99012","published_at":"2026-04-29T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.99016","published_at":"2026-05-05T12:55:00Z"},{"value":"0.77788","scoring_system":"epss","scoring_elements":"0.99017","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5743"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/webapps/28972.rb","reference_id":"CVE-2013-5743;OSVDB-98115","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/webapps/28972.rb"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943863?format=json","purl":"pkg:deb/debian/zabbix@1:2.0.8%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.0.8%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2013-5743"],"risk_score":1.4,"exploitability":"2.0","weighted_severity":"0.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cfqn-tsfr-zbce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95500?format=json","vulnerability_id":"VCID-cuqx-wxkd-nffa","summary":"Duktape is an 3rd-party embeddable JavaScript engine, with a focus on portability and compact footprint. When adding too many values in valstack JavaScript will crash. This issue occurs due to bug in Duktape 2.6 which is an 3rd-party solution that we use.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29458","reference_id":"","reference_type":"","scores":[{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28309","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28265","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31755","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.3183","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31681","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32206","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32254","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32284","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32285","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32247","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32216","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32249","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32229","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32199","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32038","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.3191","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29458"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175","reference_id":"1055175","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"},{"reference_url":"https://support.zabbix.com/browse/ZBX-22989","reference_id":"ZBX-22989","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:19:37Z/"}],"url":"https://support.zabbix.com/browse/ZBX-22989"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943878?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2023-29458"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cuqx-wxkd-nffa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90700?format=json","vulnerability_id":"VCID-d5vt-7eg9-nyha","summary":"zabbix: root","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6210.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6210.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6210","reference_id":"","reference_type":"","scores":[{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34877","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35074","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35102","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34981","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35026","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35055","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35059","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35023","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35039","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35024","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34977","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34747","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34728","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34638","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34508","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3458","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6210"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6210","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6210"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=407181","reference_id":"407181","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=407181"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452682","reference_id":"452682","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452682"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/30839.c","reference_id":"CVE-2007-6210;OSVDB-42480","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/30839.c"},{"reference_url":"https://www.securityfocus.com/bid/26680/info","reference_id":"CVE-2007-6210;OSVDB-42480","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/26680/info"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943850?format=json","purl":"pkg:deb/debian/zabbix@1:1.4.2-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.4.2-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2007-6210"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d5vt-7eg9-nyha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95542?format=json","vulnerability_id":"VCID-d7uk-h423-77f5","summary":"The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32726","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3252","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33077","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33109","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3294","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32985","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33016","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33019","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32981","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32956","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32998","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32976","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32939","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32792","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32679","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32596","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32456","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32726","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32726"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943879?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.24%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.24%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2023-32726"],"risk_score":1.3,"exploitability":"0.5","weighted_severity":"2.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d7uk-h423-77f5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96736?format=json","vulnerability_id":"VCID-dej6-dxbp-a3bt","summary":"A regular Zabbix user with no permission to the Monitoring -> Problems view is still able to call the problem.view.refresh action and therefore still retrieve a list of active problems.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49641","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16864","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16596","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16606","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16922","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16705","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16791","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16845","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16823","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1678","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16721","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16657","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16664","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17689","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17743","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17597","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49641"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117448","reference_id":"1117448","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117448"},{"reference_url":"https://support.zabbix.com/browse/ZBX-27063","reference_id":"ZBX-27063","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-03T13:51:55Z/"}],"url":"https://support.zabbix.com/browse/ZBX-27063"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2025-49641"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dej6-dxbp-a3bt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/318581?format=json","vulnerability_id":"VCID-dfwk-raex-fqfy","summary":"Due to a bug in Zabbix API, the hostprototype.get method lists all host prototypes to users that do not have any user groups assigned to them.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27238","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07011","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06957","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06992","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07399","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07167","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07292","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07249","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07257","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07229","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07243","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07666","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07682","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07592","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07681","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07698","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07696","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27238"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117448","reference_id":"1117448","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117448"},{"reference_url":"https://support.zabbix.com/browse/ZBX-26988","reference_id":"ZBX-26988","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T11:54:14Z/"}],"url":"https://support.zabbix.com/browse/ZBX-26988"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2025-27238"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dfwk-raex-fqfy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92572?format=json","vulnerability_id":"VCID-dqkj-n4af-fkhx","summary":"The Frontend in Zabbix before 1.8.20rc2, 2.0.x before 2.0.11rc2, and 2.2.x before 2.2.2rc1 allows remote \"Zabbix Admin\" users to modify the media of arbitrary users via unspecified vectors.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1685","reference_id":"","reference_type":"","scores":[{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60198","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60274","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60332","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60353","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.6034","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60321","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60361","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.6037","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60359","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.6033","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60345","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60333","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60291","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60338","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1685"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943862?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2014-1685"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dqkj-n4af-fkhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91654?format=json","vulnerability_id":"VCID-f5s2-jtvx-sfaq","summary":"Buffer overflow in ZABBIX before 1.1.5 has unknown impact and attack vectors related to \"SNMP IP addresses.\"","references":[{"reference_url":"http://osvdb.org/33081","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/33081"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0640","reference_id":"","reference_type":"","scores":[{"value":"0.00924","scoring_system":"epss","scoring_elements":"0.76127","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00924","scoring_system":"epss","scoring_elements":"0.75944","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00924","scoring_system":"epss","scoring_elements":"0.75947","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00924","scoring_system":"epss","scoring_elements":"0.7598","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00924","scoring_system":"epss","scoring_elements":"0.75958","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00924","scoring_system":"epss","scoring_elements":"0.75991","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00924","scoring_system":"epss","scoring_elements":"0.76006","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00924","scoring_system":"epss","scoring_elements":"0.7603","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00924","scoring_system":"epss","scoring_elements":"0.76007","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00924","scoring_system":"epss","scoring_elements":"0.76001","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00924","scoring_system":"epss","scoring_elements":"0.76041","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00924","scoring_system":"epss","scoring_elements":"0.76044","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00924","scoring_system":"epss","scoring_elements":"0.76029","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00924","scoring_system":"epss","scoring_elements":"0.76067","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00924","scoring_system":"epss","scoring_elements":"0.76077","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00924","scoring_system":"epss","scoring_elements":"0.76088","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00924","scoring_system":"epss","scoring_elements":"0.76097","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0640"},{"reference_url":"http://secunia.com/advisories/24020","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24020"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32038","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32038"},{"reference_url":"http://www.securityfocus.com/bid/22321","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/22321"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0416","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0416"},{"reference_url":"http://www.zabbix.com/rn1.1.5.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.zabbix.com/rn1.1.5.php"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=409257","reference_id":"409257","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=409257"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0640","reference_id":"CVE-2007-0640","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0640"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943849?format=json","purl":"pkg:deb/debian/zabbix@1:1.1.4-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.1.4-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2007-0640"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f5s2-jtvx-sfaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/267052?format=json","vulnerability_id":"VCID-f797-yxay-bffg","summary":"After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23134","reference_id":"","reference_type":"","scores":[{"value":"0.9261","scoring_system":"epss","scoring_elements":"0.9975","published_at":"2026-05-07T12:55:00Z"},{"value":"0.93096","scoring_system":"epss","scoring_elements":"0.99792","published_at":"2026-04-13T12:55:00Z"},{"value":"0.93096","scoring_system":"epss","scoring_elements":"0.99791","published_at":"2026-04-07T12:55:00Z"},{"value":"0.93096","scoring_system":"epss","scoring_elements":"0.99795","published_at":"2026-04-29T12:55:00Z"},{"value":"0.93096","scoring_system":"epss","scoring_elements":"0.99794","published_at":"2026-04-21T12:55:00Z"},{"value":"0.93096","scoring_system":"epss","scoring_elements":"0.99793","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23134"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/","reference_id":"6SZYHXINBKCY42ITFSNCYE7KCSF33VRA","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T17:20:09Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/02/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T17:20:09Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/02/msg00008.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/","reference_id":"VB6W556GVXOKUYTASTDGL3AI7S3SJHX7","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T17:20:09Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/"},{"reference_url":"https://support.zabbix.com/browse/ZBX-20384","reference_id":"ZBX-20384","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T17:20:09Z/"}],"url":"https://support.zabbix.com/browse/ZBX-20384"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943875?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.7%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.7%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2022-23134"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f797-yxay-bffg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92558?format=json","vulnerability_id":"VCID-f837-pma5-jyha","summary":"Zabbix before 5.0 represents passwords in the users table with unsalted MD5.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7484","reference_id":"","reference_type":"","scores":[{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43478","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43647","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43704","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43728","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43663","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43713","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43716","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43736","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43687","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43749","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43739","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43672","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.4361","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43613","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43532","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43403","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7484"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943865?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.0%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.0%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2013-7484"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f837-pma5-jyha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/282864?format=json","vulnerability_id":"VCID-fqc6-4dcw-tbcm","summary":"Arbitrary file read vulnerability exists in Zabbix Web Service Report Generation, which listens on the port 10053. The service does not have proper validation for URL parameters before reading the files.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46768","reference_id":"","reference_type":"","scores":[{"value":"0.05203","scoring_system":"epss","scoring_elements":"0.89984","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05203","scoring_system":"epss","scoring_elements":"0.89968","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05203","scoring_system":"epss","scoring_elements":"0.89892","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05203","scoring_system":"epss","scoring_elements":"0.89905","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05203","scoring_system":"epss","scoring_elements":"0.8991","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05203","scoring_system":"epss","scoring_elements":"0.89926","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05203","scoring_system":"epss","scoring_elements":"0.89932","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05203","scoring_system":"epss","scoring_elements":"0.89939","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05203","scoring_system":"epss","scoring_elements":"0.89937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05203","scoring_system":"epss","scoring_elements":"0.8993","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05203","scoring_system":"epss","scoring_elements":"0.89944","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05203","scoring_system":"epss","scoring_elements":"0.89946","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05203","scoring_system":"epss","scoring_elements":"0.89941","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05203","scoring_system":"epss","scoring_elements":"0.89957","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05203","scoring_system":"epss","scoring_elements":"0.89956","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05203","scoring_system":"epss","scoring_elements":"0.89955","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-46768"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026847","reference_id":"1026847","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026847"},{"reference_url":"https://support.zabbix.com/browse/ZBX-22087","reference_id":"ZBX-22087","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:48:48Z/"}],"url":"https://support.zabbix.com/browse/ZBX-22087"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943877?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.13%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.13%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2022-46768"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fqc6-4dcw-tbcm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59476?format=json","vulnerability_id":"VCID-fspv-5pb9-dfa5","summary":"Multiple vulnerabilities have been found in Zabbix, possibly\n    leading to SQL injection attacks, Denial of Service, or information\n    disclosure.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4674","reference_id":"","reference_type":"","scores":[{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.5795","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58035","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58057","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58087","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58091","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58107","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58063","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58094","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58095","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58071","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58037","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58051","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58036","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.57994","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4674"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=651225","reference_id":"651225","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=651225"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/18155.txt","reference_id":"CVE-2011-4674;OSVDB-77509","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/18155.txt"},{"reference_url":"https://security.gentoo.org/glsa/201311-15","reference_id":"GLSA-201311-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201311-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943857?format=json","purl":"pkg:deb/debian/zabbix@1:1.8.9-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.8.9-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2011-4674"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fspv-5pb9-dfa5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95499?format=json","vulnerability_id":"VCID-ftt2-5jnt-9ye2","summary":"Reflected XSS attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script can be activated through Action form fields, which can be sent as request to a website with a vulnerability that enables execution of malicious scripts.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29457","reference_id":"","reference_type":"","scores":[{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58661","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.5864","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65641","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65591","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65606","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65617","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65616","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65592","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65516","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65569","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65581","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65586","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65558","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65594","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65607","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29457"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29457","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29457"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175","reference_id":"1055175","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"},{"reference_url":"https://support.zabbix.com/browse/ZBX-22988","reference_id":"ZBX-22988","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T21:06:43Z/"}],"url":"https://support.zabbix.com/browse/ZBX-22988"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943878?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2023-29457"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ftt2-5jnt-9ye2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/97013?format=json","vulnerability_id":"VCID-fxqr-51kp-3ber","summary":"For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script items, JavaScript reprocessing, Webhooks). This can lead to confidentiality loss where a regular (non-super) Zabbix administrator leaks data for hosts they do not have access to. A fix has been released that makes the built in Zabbix JavaScript objects read-only, but please be advised that usage of global JavaScript variables is not recommended because their content could be leaked. More information <a href='https://www.zabbix.com/documentation/7.4/en/manual/installation/known_issues#preprocessing-global-variables-are-unsafe'>in Zabbix documentation</a>.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23919","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05655","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05647","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05583","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05621","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05656","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06722","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06597","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06592","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06572","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06564","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06719","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07635","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0749","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23919"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-27638","reference_id":"ZBX-27638","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-24T18:36:08Z/"}],"url":"https://support.zabbix.com/browse/ZBX-27638"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2026-23919"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fxqr-51kp-3ber"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95075?format=json","vulnerability_id":"VCID-gbn9-b2t2-5fbs","summary":"During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23132","reference_id":"","reference_type":"","scores":[{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33808","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34448","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34477","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34386","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34415","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34418","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34379","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34355","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34389","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34375","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34335","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33962","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33943","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33859","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33739","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23132"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943875?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.7%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.7%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2022-23132"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gbn9-b2t2-5fbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/281356?format=json","vulnerability_id":"VCID-gguu-hkn6-gfbk","summary":"A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI)","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-43516","reference_id":"","reference_type":"","scores":[{"value":"0.0454","scoring_system":"epss","scoring_elements":"0.89241","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0454","scoring_system":"epss","scoring_elements":"0.89224","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0454","scoring_system":"epss","scoring_elements":"0.89136","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0454","scoring_system":"epss","scoring_elements":"0.89151","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0454","scoring_system":"epss","scoring_elements":"0.89153","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0454","scoring_system":"epss","scoring_elements":"0.89171","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0454","scoring_system":"epss","scoring_elements":"0.89176","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0454","scoring_system":"epss","scoring_elements":"0.89186","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0454","scoring_system":"epss","scoring_elements":"0.89182","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0454","scoring_system":"epss","scoring_elements":"0.89179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0454","scoring_system":"epss","scoring_elements":"0.89193","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0454","scoring_system":"epss","scoring_elements":"0.89189","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0454","scoring_system":"epss","scoring_elements":"0.89206","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0454","scoring_system":"epss","scoring_elements":"0.89211","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0454","scoring_system":"epss","scoring_elements":"0.89215","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-43516"},{"reference_url":"https://support.zabbix.com/browse/ZBX-22002","reference_id":"ZBX-22002","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-18T18:08:51Z/"}],"url":"https://support.zabbix.com/browse/ZBX-22002"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2022-43516"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gguu-hkn6-gfbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92111?format=json","vulnerability_id":"VCID-gj92-45q8-h3ez","summary":"SQL injection vulnerability in events.php in Zabbix 1.8.1 and earlier allows remote attackers to execute arbitrary SQL commands via the nav_time parameter.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-5049","reference_id":"","reference_type":"","scores":[{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65328","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65376","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65402","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65366","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65419","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.6543","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65448","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65435","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65407","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65444","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65454","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.6544","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65456","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65468","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65465","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65445","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65491","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-5049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5049"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943854?format=json","purl":"pkg:deb/debian/zabbix@1:1.8.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.8.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2010-5049"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gj92-45q8-h3ez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96114?format=json","vulnerability_id":"VCID-gp3f-yz9h-eqax","summary":"The front-end audit log allows viewing of unprotected plaintext passwords, where the passwords are displayed in plain text.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36460","reference_id":"","reference_type":"","scores":[{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63527","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63508","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63482","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63426","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63453","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63418","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.6347","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63487","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63504","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63488","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63454","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63495","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.6348","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63499","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36460"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553","reference_id":"1078553","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25017","reference_id":"ZBX-25017","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:04:09Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25017"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943883?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-36460"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gp3f-yz9h-eqax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91626?format=json","vulnerability_id":"VCID-gpdt-h3pp-h3ga","summary":"Multiple format string vulnerabilities in zabbix before 20061006 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via format string specifiers in information that would be recorded in the system log using (1) zabbix_log or (2) zabbix_syslog.","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388"},{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi/zabbix.security.patch?bug=391388%3Bmsg=5%3Batt=1","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi/zabbix.security.patch?bug=391388%3Bmsg=5%3Batt=1"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6692","reference_id":"","reference_type":"","scores":[{"value":"0.05993","scoring_system":"epss","scoring_elements":"0.90744","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05993","scoring_system":"epss","scoring_elements":"0.90639","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05993","scoring_system":"epss","scoring_elements":"0.90644","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05993","scoring_system":"epss","scoring_elements":"0.90655","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05993","scoring_system":"epss","scoring_elements":"0.90663","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05993","scoring_system":"epss","scoring_elements":"0.90674","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05993","scoring_system":"epss","scoring_elements":"0.90679","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05993","scoring_system":"epss","scoring_elements":"0.90688","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05993","scoring_system":"epss","scoring_elements":"0.90689","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05993","scoring_system":"epss","scoring_elements":"0.90685","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05993","scoring_system":"epss","scoring_elements":"0.90704","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05993","scoring_system":"epss","scoring_elements":"0.90701","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05993","scoring_system":"epss","scoring_elements":"0.90698","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05993","scoring_system":"epss","scoring_elements":"0.90714","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05993","scoring_system":"epss","scoring_elements":"0.90715","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05993","scoring_system":"epss","scoring_elements":"0.90711","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05993","scoring_system":"epss","scoring_elements":"0.90725","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6692"},{"reference_url":"http://secunia.com/advisories/22313","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/22313"},{"reference_url":"http://www.securityfocus.com/bid/20416","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/20416"},{"reference_url":"http://www.vupen.com/english/advisories/2006/3959","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/3959"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388","reference_id":"391388","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6692","reference_id":"CVE-2006-6692","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6692"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/28775.pl","reference_id":"CVE-2006-6692;OSVDB-29575","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/28775.pl"},{"reference_url":"https://www.securityfocus.com/bid/20416/info","reference_id":"CVE-2006-6692;OSVDB-29575","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/20416/info"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943845?format=json","purl":"pkg:deb/debian/zabbix@1:1.1.2-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.1.2-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2006-6692"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gpdt-h3pp-h3ga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/267137?format=json","vulnerability_id":"VCID-gyqk-zsww-ykdj","summary":"Specially crafted string can cause a buffer overrun in the JSON parser library leading to a crash of the Zabbix Server or a Zabbix Proxy.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29451","reference_id":"","reference_type":"","scores":[{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29542","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31339","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31801","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31632","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31504","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3142","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3127","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31807","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3186","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31888","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31891","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31852","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31817","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31849","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31829","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29451"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175","reference_id":"1055175","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"},{"reference_url":"https://support.zabbix.com/browse/ZBX-22587","reference_id":"ZBX-22587","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:25:43Z/"}],"url":"https://support.zabbix.com/browse/ZBX-22587"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943878?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2023-29451"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gyqk-zsww-ykdj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92237?format=json","vulnerability_id":"VCID-h73t-dvgp-dbeu","summary":"Multiple cross-site scripting (XSS) vulnerabilities in Zabbix before 1.8.10 allow remote attackers to inject arbitrary web script or HTML via the gname parameter (aka host groups name) to (1) hostgroups.php and (2) usergrps.php, the update action to (3) hosts.php and (4) scripts.php, and (5) maintenance.php.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4615","reference_id":"","reference_type":"","scores":[{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67729","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67762","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67782","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67813","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67828","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67851","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67838","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67801","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67837","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.6785","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67831","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.6786","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67865","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.6784","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67883","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4615"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652664","reference_id":"652664","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652664"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943858?format=json","purl":"pkg:deb/debian/zabbix@1:1.8.10-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.8.10-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2011-4615"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h73t-dvgp-dbeu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/209000?format=json","vulnerability_id":"VCID-hfam-an1b-u7e3","summary":"A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36465","reference_id":"","reference_type":"","scores":[{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.65995","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.65991","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66023","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71699","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71675","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71679","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71664","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71589","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.716","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71623","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71608","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71634","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.71639","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.7162","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00681","scoring_system":"epss","scoring_elements":"0.7167","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36465"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-26257","reference_id":"ZBX-26257","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T15:09:12Z/"}],"url":"https://support.zabbix.com/browse/ZBX-26257"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943886?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-36465"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hfam-an1b-u7e3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/208263?format=json","vulnerability_id":"VCID-hgbt-8rz5-q3a9","summary":"Uncontrolled resource consumption refers to a software vulnerability where a attacker or system uses excessive resources, such as CPU, memory, or network bandwidth, without proper limitations or controls. This can cause a denial-of-service (DoS) attack or degrade the performance of the affected system.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36462","reference_id":"","reference_type":"","scores":[{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52892","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.5293","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52891","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52841","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52868","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52894","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52863","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52913","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52957","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52941","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52925","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52962","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52969","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52953","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52919","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36462"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553","reference_id":"1078553","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25019","reference_id":"ZBX-25019","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-09T12:57:48Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25019"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943883?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-36462"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hgbt-8rz5-q3a9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59477?format=json","vulnerability_id":"VCID-ju7r-4ugw-k7c7","summary":"Multiple vulnerabilities have been found in Zabbix, possibly\n    leading to SQL injection attacks, Denial of Service, or information\n    disclosure.","references":[{"reference_url":"http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54","reference_id":"","reference_type":"","scores":[],"url":"http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54"},{"reference_url":"http://osvdb.org/84127","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/84127"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3435","reference_id":"","reference_type":"","scores":[{"value":"0.01799","scoring_system":"epss","scoring_elements":"0.82901","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01799","scoring_system":"epss","scoring_elements":"0.82822","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01799","scoring_system":"epss","scoring_elements":"0.82821","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01799","scoring_system":"epss","scoring_elements":"0.82824","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01799","scoring_system":"epss","scoring_elements":"0.82847","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01799","scoring_system":"epss","scoring_elements":"0.82856","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01799","scoring_system":"epss","scoring_elements":"0.82861","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01799","scoring_system":"epss","scoring_elements":"0.8288","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02759","scoring_system":"epss","scoring_elements":"0.86014","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02759","scoring_system":"epss","scoring_elements":"0.85962","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02759","scoring_system":"epss","scoring_elements":"0.85978","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02759","scoring_system":"epss","scoring_elements":"0.85997","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02759","scoring_system":"epss","scoring_elements":"0.86007","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02759","scoring_system":"epss","scoring_elements":"0.86021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02759","scoring_system":"epss","scoring_elements":"0.86019","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02759","scoring_system":"epss","scoring_elements":"0.85951","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3435"},{"reference_url":"http://secunia.com/advisories/49809","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/49809"},{"reference_url":"http://secunia.com/advisories/50475","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50475"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/77195","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/77195"},{"reference_url":"https://support.zabbix.com/browse/ZBX-5348","reference_id":"","reference_type":"","scores":[],"url":"https://support.zabbix.com/browse/ZBX-5348"},{"reference_url":"http://www.debian.org/security/2012/dsa-2539","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2012/dsa-2539"},{"reference_url":"http://www.exploit-db.com/exploits/20087","reference_id":"","reference_type":"","scores":[],"url":"http://www.exploit-db.com/exploits/20087"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/07/27/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/07/27/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/07/28/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/07/28/3"},{"reference_url":"http://www.securityfocus.com/bid/54661","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/54661"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683273","reference_id":"683273","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683273"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.0:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.0:rc5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.0:rc6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.0:rc6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:*:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3435","reference_id":"CVE-2012-3435","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3435"},{"reference_url":"https://security.gentoo.org/glsa/201311-15","reference_id":"GLSA-201311-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201311-15"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/20087.py","reference_id":"OSVDB-84127;CVE-2012-3435","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/20087.py"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943859?format=json","purl":"pkg:deb/debian/zabbix@1:2.0.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.0.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2012-3435"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ju7r-4ugw-k7c7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95498?format=json","vulnerability_id":"VCID-kx3g-p2zj-duaj","summary":"URL validation scheme receives input from a user and then parses it to identify its various components. The validation scheme can ensure that all URL components comply with internet standards.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29456","reference_id":"","reference_type":"","scores":[{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31519","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31478","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.356","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35762","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.3573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35643","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35529","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36006","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36056","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36074","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36081","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36042","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36016","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36055","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36041","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35989","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29456"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175","reference_id":"1055175","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"},{"reference_url":"https://support.zabbix.com/browse/ZBX-22987","reference_id":"ZBX-22987","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:19:48Z/"}],"url":"https://support.zabbix.com/browse/ZBX-22987"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943878?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2023-29456"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kx3g-p2zj-duaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95102?format=json","vulnerability_id":"VCID-mggj-rvdd-eqc6","summary":"An authenticated user can create a link with reflected Javascript code inside it for services’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24917","reference_id":"","reference_type":"","scores":[{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53445","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53387","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53413","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53382","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53434","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53429","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53478","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53462","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75514","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75438","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75444","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75433","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75468","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75472","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75477","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75485","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24917"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24917","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24917"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943875?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.7%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.7%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2022-24917"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mggj-rvdd-eqc6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96210?format=json","vulnerability_id":"VCID-mhx5-hcg2-wfc4","summary":"The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaScript payload may be injected into the above endpoint causing it to be executed within the context of the victim's browser.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45699","reference_id":"","reference_type":"","scores":[{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43363","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.435","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43417","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43288","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43591","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43618","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43554","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43605","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.4361","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43629","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43597","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43581","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43642","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43631","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43566","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43496","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45699","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45699"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-26254","reference_id":"ZBX-26254","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T16:28:20Z/"}],"url":"https://support.zabbix.com/browse/ZBX-26254"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943888?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.46%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.46%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943886?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-45699"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mhx5-hcg2-wfc4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/318582?format=json","vulnerability_id":"VCID-n5md-76wa-dbaa","summary":"A Zabbix adminitrator can inject arbitrary SQL during the autoremoval of hosts by inserting malicious SQL in the 'Visible name' field.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27240","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18122","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18068","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17823","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.18993","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19182","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19193","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19084","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19075","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1903","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.18911","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20055","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20113","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20037","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20075","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20132","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20158","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27240"},{"reference_url":"https://support.zabbix.com/browse/ZBX-26986","reference_id":"ZBX-26986","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-13T03:55:34Z/"}],"url":"https://support.zabbix.com/browse/ZBX-26986"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943881?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.5%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.5%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2025-27240"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n5md-76wa-dbaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96115?format=json","vulnerability_id":"VCID-nrkb-pzcu-8ueg","summary":"Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36461","reference_id":"","reference_type":"","scores":[{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.7269","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72671","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72667","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72659","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72536","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72553","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.7253","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72568","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.7258","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72604","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72587","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72576","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72618","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72629","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.7262","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72662","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36461"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36461","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36461"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553","reference_id":"1078553","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25018","reference_id":"ZBX-25018","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T15:21:52Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25018"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943883?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-36461"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nrkb-pzcu-8ueg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94391?format=json","vulnerability_id":"VCID-nvpx-ucxf-xkgt","summary":"Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15803","reference_id":"","reference_type":"","scores":[{"value":"0.02092","scoring_system":"epss","scoring_elements":"0.83966","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02092","scoring_system":"epss","scoring_elements":"0.8398","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02092","scoring_system":"epss","scoring_elements":"0.83995","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02092","scoring_system":"epss","scoring_elements":"0.83998","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02092","scoring_system":"epss","scoring_elements":"0.84021","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02092","scoring_system":"epss","scoring_elements":"0.84028","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02092","scoring_system":"epss","scoring_elements":"0.84045","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02092","scoring_system":"epss","scoring_elements":"0.84038","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02305","scoring_system":"epss","scoring_elements":"0.84748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05067","scoring_system":"epss","scoring_elements":"0.89828","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05067","scoring_system":"epss","scoring_elements":"0.89844","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05067","scoring_system":"epss","scoring_elements":"0.89804","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05067","scoring_system":"epss","scoring_elements":"0.89805","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05067","scoring_system":"epss","scoring_elements":"0.89799","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05067","scoring_system":"epss","scoring_elements":"0.89814","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05067","scoring_system":"epss","scoring_elements":"0.89813","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15803"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966146","reference_id":"966146","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966146"},{"reference_url":"https://usn.ubuntu.com/USN-4767-1/","reference_id":"USN-USN-4767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4767-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943874?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2020-15803"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nvpx-ucxf-xkgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59474?format=json","vulnerability_id":"VCID-nxzp-nb57-9fhx","summary":"Multiple vulnerabilities have been found in Zabbix, possibly\n    leading to SQL injection attacks, Denial of Service, or information\n    disclosure.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2904","reference_id":"","reference_type":"","scores":[{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73381","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.7339","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73413","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73385","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73422","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73435","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73459","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73439","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73431","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73474","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73483","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73476","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73509","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73521","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73518","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73512","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73537","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2904"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2904","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2904"},{"reference_url":"https://security.gentoo.org/glsa/201311-15","reference_id":"GLSA-201311-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201311-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943856?format=json","purl":"pkg:deb/debian/zabbix@1:1.8.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.8.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2011-2904"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nxzp-nb57-9fhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/259075?format=json","vulnerability_id":"VCID-nye8-x53u-zkhw","summary":"A non-admin user can change or remove important features within the Zabbix Agent application, thus impacting the integrity and availability of the application.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22121","reference_id":"","reference_type":"","scores":[{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08893","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08811","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08823","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08742","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08785","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08833","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08766","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08844","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.0887","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08838","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08825","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08715","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.0869","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08841","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08856","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22121"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25011","reference_id":"ZBX-25011","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T15:17:38Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25011"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-22121"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nye8-x53u-zkhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/291840?format=json","vulnerability_id":"VCID-nyhx-57xy-wugc","summary":"Currently, geomap configuration (Administration -> General -> Geographical maps) allows using HTML in the field “Attribution text” when selected “Other” Tile provider.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29452","reference_id":"","reference_type":"","scores":[{"value":"0.01801","scoring_system":"epss","scoring_elements":"0.82757","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01801","scoring_system":"epss","scoring_elements":"0.82744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83661","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83617","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83641","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83507","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83531","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83541","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83556","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.8355","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83545","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.8358","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83581","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83582","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83606","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01972","scoring_system":"epss","scoring_elements":"0.83613","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29452"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175","reference_id":"1055175","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"},{"reference_url":"https://support.zabbix.com/browse/ZBX-22981","reference_id":"ZBX-22981","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T16:21:55Z/"}],"url":"https://support.zabbix.com/browse/ZBX-22981"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943878?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2023-29452"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nyhx-57xy-wugc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94337?format=json","vulnerability_id":"VCID-p9f4-1jph-qff7","summary":"Zabbix Server 2.2.x and 3.0.x before 3.0.31, and 3.2 allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-11800","reference_id":"","reference_type":"","scores":[{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97687","published_at":"2026-04-01T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97694","published_at":"2026-04-07T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97698","published_at":"2026-04-08T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97701","published_at":"2026-04-09T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97705","published_at":"2026-04-11T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97707","published_at":"2026-04-12T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97708","published_at":"2026-04-13T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97714","published_at":"2026-04-16T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97718","published_at":"2026-04-26T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97717","published_at":"2026-04-24T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97723","published_at":"2026-04-29T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97726","published_at":"2026-05-05T12:55:00Z"},{"value":"0.47753","scoring_system":"epss","scoring_elements":"0.97728","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-11800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11800"},{"reference_url":"https://usn.ubuntu.com/USN-4767-1/","reference_id":"USN-USN-4767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4767-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943872?format=json","purl":"pkg:deb/debian/zabbix@1:4.0.0%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:4.0.0%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2020-11800"],"risk_score":0.2,"exploitability":"0.5","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p9f4-1jph-qff7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96177?format=json","vulnerability_id":"VCID-psak-h1x6-1kca","summary":"Zabbix API user.get returns all users that share common group with the calling user. This includes media and other information, such as login attempts, etc.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42325","reference_id":"","reference_type":"","scores":[{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27818","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28263","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28245","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28198","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27999","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27921","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27756","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28348","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28352","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28309","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28251","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31776","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31731","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31594","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31647","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42325"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-26258","reference_id":"ZBX-26258","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:48:54Z/"}],"url":"https://support.zabbix.com/browse/ZBX-26258"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943888?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.46%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.46%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943886?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.9%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.9%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-42325"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-psak-h1x6-1kca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/267051?format=json","vulnerability_id":"VCID-pyz2-fufh-c7gc","summary":"In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23131","reference_id":"","reference_type":"","scores":[{"value":"0.94045","scoring_system":"epss","scoring_elements":"0.99901","published_at":"2026-05-07T12:55:00Z"},{"value":"0.94045","scoring_system":"epss","scoring_elements":"0.999","published_at":"2026-05-05T12:55:00Z"},{"value":"0.94252","scoring_system":"epss","scoring_elements":"0.99931","published_at":"2026-04-02T12:55:00Z"},{"value":"0.94252","scoring_system":"epss","scoring_elements":"0.99932","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23131"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-20350","reference_id":"ZBX-20350","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:20:59Z/"}],"url":"https://support.zabbix.com/browse/ZBX-20350"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2022-23131"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pyz2-fufh-c7gc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95104?format=json","vulnerability_id":"VCID-qhxc-w75p-kqaj","summary":"An authenticated user can create a link with reflected Javascript code inside it for graphs’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24919","reference_id":"","reference_type":"","scores":[{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53445","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53387","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53413","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53382","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53434","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53429","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53478","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53462","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75514","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75438","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75444","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75433","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75468","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75472","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75477","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75485","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24919"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24919"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943875?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.7%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.7%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2022-24919"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qhxc-w75p-kqaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96580?format=json","vulnerability_id":"VCID-qzp5-px2f-vqc8","summary":"A regular Zabbix user can search other users in their user group via Zabbix API by select fields the user does not have access to view. This allows data-mining some field values the user does not have access to.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27236","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14616","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14756","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14643","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14646","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14832","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14636","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14726","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14785","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14745","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14708","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14654","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14546","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16598","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1661","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16477","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27236"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27236","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27236"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117448","reference_id":"1117448","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117448"},{"reference_url":"https://support.zabbix.com/browse/ZBX-27060","reference_id":"ZBX-27060","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-03T13:52:30Z/"}],"url":"https://support.zabbix.com/browse/ZBX-27060"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2025-27236"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qzp5-px2f-vqc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64351?format=json","vulnerability_id":"VCID-qzzk-mcfu-sfhv","summary":"zabbix: Zabbix: Confidentiality loss via improper access control in configuration.import API","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23925.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23925.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23925","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01567","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01563","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02416","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02374","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02427","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02402","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02331","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02334","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02356","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02333","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02319","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02317","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02301","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02307","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02403","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02385","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23925"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2445155","reference_id":"2445155","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2445155"},{"reference_url":"https://support.zabbix.com/browse/ZBX-27567","reference_id":"ZBX-27567","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:H/SI:N/SA:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-09T20:54:37Z/"}],"url":"https://support.zabbix.com/browse/ZBX-27567"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2026-23925"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qzzk-mcfu-sfhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95494?format=json","vulnerability_id":"VCID-r65p-6wkq-sfb9","summary":"JavaScript pre-processing can be used by the attacker to gain access to the file system (read-only access on behalf of user \"zabbix\") on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29450","reference_id":"","reference_type":"","scores":[{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52331","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52434","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52366","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52376","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52339","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.5228","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52321","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52374","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52369","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52419","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52403","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52389","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52428","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-29450"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29450","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29450"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175","reference_id":"1055175","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055175"},{"reference_url":"https://support.zabbix.com/browse/ZBX-22588","reference_id":"ZBX-22588","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T14:20:54Z/"}],"url":"https://support.zabbix.com/browse/ZBX-22588"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943878?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2023-29450"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r65p-6wkq-sfb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/97014?format=json","vulnerability_id":"VCID-r8yr-aet5-yydn","summary":"Host and event action script input is validated with a regex (set by the administrator), but the validation runs in multiline mode. If ^ and $ anchors are used in user input validation, an injected newline lets authenticated users bypass the check and inject shell commands.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23920","reference_id":"","reference_type":"","scores":[{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16305","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16462","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16233","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1634","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16524","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1632","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16406","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16465","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16449","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1641","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18587","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18673","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18628","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18503","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23920"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23920","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23920"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-27639","reference_id":"ZBX-27639","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T19:24:03Z/"}],"url":"https://support.zabbix.com/browse/ZBX-27639"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2026-23920"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r8yr-aet5-yydn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/208127?format=json","vulnerability_id":"VCID-ry8x-mjbp-qqct","summary":"A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36466","reference_id":"","reference_type":"","scores":[{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40537","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40555","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40585","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40565","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40592","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40513","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40564","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40574","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40593","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40556","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48723","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48796","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48747","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48661","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48799","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48788","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36466"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25635","reference_id":"ZBX-25635","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-04T04:55:27Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25635"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943883?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.1%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.1%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-36466"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ry8x-mjbp-qqct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96737?format=json","vulnerability_id":"VCID-s1mb-1gsj-pbed","summary":"An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49643","reference_id":"","reference_type":"","scores":[{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24546","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.2447","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24627","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3284","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3287","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32871","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32832","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32936","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32848","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32825","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3279","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32639","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32525","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32806","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32971","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32793","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49643"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121841","reference_id":"1121841","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121841"},{"reference_url":"https://support.zabbix.com/browse/ZBX-27284","reference_id":"ZBX-27284","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-01T14:33:57Z/"}],"url":"https://support.zabbix.com/browse/ZBX-27284"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2025-49643"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s1mb-1gsj-pbed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/207015?format=json","vulnerability_id":"VCID-s7ze-4huv-qqep","summary":"The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session->securityEngineID to local_record.engineid without proper bounds checking.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36468","reference_id":"","reference_type":"","scores":[{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58488","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.585","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58468","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58438","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58457","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58432","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58484","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.5849","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65825","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65793","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65804","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65777","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65794","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.6578","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36468"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689","reference_id":"1088689","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25621","reference_id":"ZBX-25621","reference_type":"","scores":[{"value":"3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:57:25Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25621"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943884?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.3%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.3%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-36468"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s7ze-4huv-qqep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/318580?format=json","vulnerability_id":"VCID-s8ez-bd4f-vkch","summary":"In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file is loaded from a path writable by low-privileged users, allowing malicious modification and potential local privilege escalation by injecting a DLL.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27237","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01052","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01048","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01044","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01114","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.0112","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01055","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01064","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01069","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01068","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01053","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01049","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01284","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01279","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27237"},{"reference_url":"https://support.zabbix.com/browse/ZBX-27061","reference_id":"ZBX-27061","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-04T03:55:25Z/"}],"url":"https://support.zabbix.com/browse/ZBX-27061"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2025-27237"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s8ez-bd4f-vkch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92855?format=json","vulnerability_id":"VCID-sssa-fyxz-xfbz","summary":"Zabbix before 2.2.21rc1, 3.x before 3.0.13rc1, 3.1.x and 3.2.x before 3.2.10rc1, and 3.3.x and 3.4.x before 3.4.4rc1 allows open redirect via the request parameter.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10742","reference_id":"","reference_type":"","scores":[{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60353","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60306","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60212","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60314","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60282","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60332","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60347","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60368","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60355","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60336","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60377","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60385","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60374","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60345","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.6036","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10742"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html"},{"reference_url":"https://support.zabbix.com/browse/ZBX-10272","reference_id":"","reference_type":"","scores":[],"url":"https://support.zabbix.com/browse/ZBX-10272"},{"reference_url":"https://support.zabbix.com/browse/ZBX-13133","reference_id":"","reference_type":"","scores":[],"url":"https://support.zabbix.com/browse/ZBX-13133"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10742","reference_id":"CVE-2016-10742","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"},{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10742"},{"reference_url":"https://usn.ubuntu.com/USN-4767-1/","reference_id":"USN-USN-4767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4767-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943869?format=json","purl":"pkg:deb/debian/zabbix@1:3.0.17%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:3.0.17%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2016-10742"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sssa-fyxz-xfbz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/318579?format=json","vulnerability_id":"VCID-sudd-unuw-wqa9","summary":"Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a Windows system.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27233","reference_id":"","reference_type":"","scores":[{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09365","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09326","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09578","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09725","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09767","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09734","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09693","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09606","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09772","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09416","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10357","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10399","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10336","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1021","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10306","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27233"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117448","reference_id":"1117448","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117448"},{"reference_url":"https://support.zabbix.com/browse/ZBX-26987","reference_id":"ZBX-26987","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T11:57:58Z/"}],"url":"https://support.zabbix.com/browse/ZBX-26987"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2025-27233"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sudd-unuw-wqa9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61622?format=json","vulnerability_id":"VCID-tekr-xkck-pkfu","summary":"Multiple vulnerabilities in Asterisk might allow remote attackers to cause\n    a Denial of Service condition, or conduct other attacks.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-7220.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-7220.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-7220","reference_id":"","reference_type":"","scores":[{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93033","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93041","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93045","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93053","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93058","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93063","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.9306","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93062","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93073","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93076","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93082","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93088","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93087","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93084","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93092","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93106","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-7220"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7220","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7220"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=523277","reference_id":"523277","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=523277"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555220","reference_id":"555220","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555220"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555221","reference_id":"555221","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555221"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555242","reference_id":"555242","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555242"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555244","reference_id":"555244","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555244"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555250","reference_id":"555250","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555250"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555255","reference_id":"555255","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555255"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555259","reference_id":"555259","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555259"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555266","reference_id":"555266","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555266"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=558977","reference_id":"558977","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=558977"},{"reference_url":"https://security.gentoo.org/glsa/201006-20","reference_id":"GLSA-201006-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201006-20"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2008-7220"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tekr-xkck-pkfu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/266464?format=json","vulnerability_id":"VCID-tvzm-h9yk-dqhh","summary":"Library loading on AIX Zabbix Agent builds can be hijacked by local users with write access to the /home/cecuser directory.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49642","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04281","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04307","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04644","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0768","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07697","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07695","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07604","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07665","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07591","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07578","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07719","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07668","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07681","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07646","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07621","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49642"},{"reference_url":"https://support.zabbix.com/browse/ZBX-27283","reference_id":"ZBX-27283","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-01T14:36:06Z/"}],"url":"https://support.zabbix.com/browse/ZBX-27283"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2025-49642"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tvzm-h9yk-dqhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96578?format=json","vulnerability_id":"VCID-uh37-bv9z-1bdz","summary":"The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27231","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13398","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13532","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13376","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13402","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13594","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13391","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13521","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13494","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13458","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13411","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13318","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15239","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15247","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15113","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27231"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117448","reference_id":"1117448","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117448"},{"reference_url":"https://support.zabbix.com/browse/ZBX-27062","reference_id":"ZBX-27062","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-03T13:55:44Z/"}],"url":"https://support.zabbix.com/browse/ZBX-27062"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2025-27231"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uh37-bv9z-1bdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94694?format=json","vulnerability_id":"VCID-upzh-6yjy-tff3","summary":"In Zabbix from 4.0.x before 4.0.28rc1, 5.0.0alpha1 before 5.0.10rc1, 5.2.x before 5.2.6rc1, and 5.4.0alpha1 before 5.4.0beta2, the CControllerAuthenticationUpdate controller lacks a CSRF protection mechanism. The code inside this controller calls diableSIDValidation inside the init() method. An attacker doesn't have to know Zabbix user login credentials, but has to know the correct Zabbix URL and contact information of an existing user with sufficient privileges.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-27927","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22587","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22356","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22271","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22369","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22371","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22381","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22533","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22583","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31691","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34781","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34928","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34964","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3496","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34931","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34886","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.35006","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3498","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-27927"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27927","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27927"},{"reference_url":"https://security.archlinux.org/AVG-1771","reference_id":"AVG-1771","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1771"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2021-27927"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-upzh-6yjy-tff3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95103?format=json","vulnerability_id":"VCID-uu3f-3rbn-9fad","summary":"An authenticated user can create a link with reflected Javascript code inside it for items’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24918","reference_id":"","reference_type":"","scores":[{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.7672","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76569","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76598","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76578","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.7661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76621","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76647","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76627","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76617","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76659","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76663","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76651","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76682","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76689","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76701","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24918"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943875?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.7%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.7%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2022-24918"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uu3f-3rbn-9fad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66417?format=json","vulnerability_id":"VCID-uv2e-h2ju-2fgj","summary":"zabbix: Zabbix: Authenticated Super Admin can read arbitrary files via oauth.authorize action","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27232.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27232.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27232","reference_id":"","reference_type":"","scores":[{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.0904","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09007","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08881","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15078","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14882","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14971","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15022","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14986","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1495","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14892","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14792","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14799","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14857","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14893","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14896","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27232"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2417984","reference_id":"2417984","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2417984"},{"reference_url":"https://support.zabbix.com/browse/ZBX-27282","reference_id":"ZBX-27282","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-01T14:38:44Z/"}],"url":"https://support.zabbix.com/browse/ZBX-27282"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2025-27232"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uv2e-h2ju-2fgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96180?format=json","vulnerability_id":"VCID-uxdf-6tyd-rucd","summary":"The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42332","reference_id":"","reference_type":"","scores":[{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62263","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62276","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62269","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62214","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.6216","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62191","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62158","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62208","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62226","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62244","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62234","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62212","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62258","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62265","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62249","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00425","scoring_system":"epss","scoring_elements":"0.62259","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42332"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689","reference_id":"1088689","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25628","reference_id":"ZBX-25628","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:54:59Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25628"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943885?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.45%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.45%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943881?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.5%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.5%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-42332"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uxdf-6tyd-rucd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94076?format=json","vulnerability_id":"VCID-uxf8-8rzq-kfhm","summary":"An issue was discovered in zabbix.php?action=dashboard.view&dashboardid=1 in Zabbix through 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any Username/Password (i.e., anonymously). All created elements (Dashboard/Report/Screen/Map) are accessible by other users and by an admin.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17382","reference_id":"","reference_type":"","scores":[{"value":"0.93689","scoring_system":"epss","scoring_elements":"0.99852","published_at":"2026-05-07T12:55:00Z"},{"value":"0.93689","scoring_system":"epss","scoring_elements":"0.99851","published_at":"2026-05-05T12:55:00Z"},{"value":"0.93689","scoring_system":"epss","scoring_elements":"0.99846","published_at":"2026-04-02T12:55:00Z"},{"value":"0.93689","scoring_system":"epss","scoring_elements":"0.99847","published_at":"2026-04-11T12:55:00Z"},{"value":"0.93689","scoring_system":"epss","scoring_elements":"0.99848","published_at":"2026-04-21T12:55:00Z"},{"value":"0.93689","scoring_system":"epss","scoring_elements":"0.99849","published_at":"2026-04-16T12:55:00Z"},{"value":"0.93689","scoring_system":"epss","scoring_elements":"0.9985","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17382"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"},{"reference_url":"https://www.exploit-db.com/exploits/47467","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/47467"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17382","reference_id":"CVE-2019-17382","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:N"},{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17382"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943865?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.0%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.0%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2019-17382"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uxf8-8rzq-kfhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93205?format=json","vulnerability_id":"VCID-v3cn-k1r9-zkg4","summary":"An information disclosure vulnerability exists in the iConfig proxy request of Zabbix server 2.4.X. A specially crafted iConfig proxy request can cause the Zabbix server to send the configuration information of any Zabbix proxy, resulting in information disclosure. An attacker can make requests from an active Zabbix proxy to trigger this vulnerability.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2826","reference_id":"","reference_type":"","scores":[{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49537","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49567","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49594","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49601","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49595","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49612","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49583","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49584","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49631","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49629","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.496","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49591","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.4956","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49477","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49536","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2826"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943872?format=json","purl":"pkg:deb/debian/zabbix@1:4.0.0%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:4.0.0%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2017-2826"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v3cn-k1r9-zkg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/267145?format=json","vulnerability_id":"VCID-vkfp-asar-7bhw","summary":"The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32725","reference_id":"","reference_type":"","scores":[{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50132","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50194","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50222","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50171","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50225","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50218","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50246","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.5022","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50208","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50253","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50255","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50229","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50202","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50162","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50079","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32725"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943852?format=json","purl":"pkg:deb/debian/zabbix@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943878?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.23%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.23%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2023-32725"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vkfp-asar-7bhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85433?format=json","vulnerability_id":"VCID-vq8w-tph7-hfav","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2825","reference_id":"","reference_type":"","scores":[{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70303","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70261","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70136","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70148","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70164","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70141","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70189","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70204","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70227","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70212","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70241","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.7025","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70229","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.7028","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70288","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70287","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2825"},{"reference_url":"https://talosintelligence.com/vulnerability_reports/TALOS-2017-0326","reference_id":"","reference_type":"","scores":[],"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2017-0326"},{"reference_url":"https://www.debian.org/security/2017/dsa-3937","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-3937"},{"reference_url":"http://www.securityfocus.com/bid/98094","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/98094"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863584","reference_id":"863584","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863584"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2825","reference_id":"CVE-2017-2825","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2825"},{"reference_url":"https://usn.ubuntu.com/USN-4767-1/","reference_id":"USN-USN-4767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4767-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943871?format=json","purl":"pkg:deb/debian/zabbix@1:3.0.7%2Bdfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:3.0.7%252Bdfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2017-2825"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vq8w-tph7-hfav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91627?format=json","vulnerability_id":"VCID-w483-qk2t-tbab","summary":"Multiple buffer overflows in zabbix before 20061006 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via long strings to the (1) zabbix_log and (2) zabbix_syslog functions.","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388"},{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi/zabbix.security.patch?bug=391388%3Bmsg=5%3Batt=1","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi/zabbix.security.patch?bug=391388%3Bmsg=5%3Batt=1"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6693","reference_id":"","reference_type":"","scores":[{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76957","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76789","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76822","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76802","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76844","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76872","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76852","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76846","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.7689","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76894","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76886","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76919","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76926","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76938","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76927","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6693"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6693","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6693"},{"reference_url":"http://secunia.com/advisories/22313","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/22313"},{"reference_url":"http://www.securityfocus.com/bid/20416","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/20416"},{"reference_url":"http://www.vupen.com/english/advisories/2006/3959","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/3959"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388","reference_id":"391388","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6693","reference_id":"CVE-2006-6693","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6693"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943845?format=json","purl":"pkg:deb/debian/zabbix@1:1.1.2-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.1.2-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2006-6693"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w483-qk2t-tbab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95946?format=json","vulnerability_id":"VCID-wczj-cv1m-7qce","summary":"An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22116","reference_id":"","reference_type":"","scores":[{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65928","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.6591","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65908","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65882","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65815","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65845","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65811","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65863","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65875","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65894","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65881","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65851","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65886","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65901","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65889","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00497","scoring_system":"epss","scoring_elements":"0.65899","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22116","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22116"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553","reference_id":"1078553","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078553"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25016","reference_id":"ZBX-25016","reference_type":"","scores":[{"value":"9.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-04T04:55:28Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25016"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943880?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.0%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.0%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-22116"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wczj-cv1m-7qce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95292?format=json","vulnerability_id":"VCID-wfae-uyd7-ybc3","summary":"Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix Frontend while it is being maintained and possible sensitive data will be prevented from being disclosed. An attacker can bypass this protection and access the instance using IP address not listed in the defined range.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-43515","reference_id":"","reference_type":"","scores":[{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31727","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31813","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31684","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.3172","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.3176","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31757","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31857","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31676","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38631","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38557","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39757","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39465","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39369","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39451","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39728","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39644","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-43515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43515"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026847","reference_id":"1026847","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026847"},{"reference_url":"https://support.zabbix.com/browse/ZBX-22050","reference_id":"ZBX-22050","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T17:57:56Z/"}],"url":"https://support.zabbix.com/browse/ZBX-22050"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943877?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.13%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.13%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2022-43515"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wfae-uyd7-ybc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92571?format=json","vulnerability_id":"VCID-x4be-du7g-kuav","summary":"The API in Zabbix before 1.8.20rc1, 2.0.x before 2.0.11rc1, and 2.2.x before 2.2.2rc1 allows remote authenticated users to spoof arbitrary users via the user name in a user.login request.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1682","reference_id":"","reference_type":"","scores":[{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48512","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48547","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48571","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48577","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48573","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48594","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48567","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.4858","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.4863","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48626","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48583","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48568","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48579","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48527","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48443","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48505","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1682"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1682"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737818","reference_id":"737818","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737818"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943862?format=json","purl":"pkg:deb/debian/zabbix@1:2.2.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:2.2.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2014-1682"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x4be-du7g-kuav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95540?format=json","vulnerability_id":"VCID-xjj4-u4gj-x7ea","summary":"Request to LDAP is sent before user permissions are checked.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32723","reference_id":"","reference_type":"","scores":[{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31331","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31497","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31412","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31263","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31937","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31979","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31798","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3185","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3188","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31884","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31845","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31809","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31841","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31821","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31792","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31624","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32723"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877","reference_id":"1053877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053877"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html","reference_id":"msg00012.html","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:43:34Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html"},{"reference_url":"https://support.zabbix.com/browse/ZBX-23230","reference_id":"ZBX-23230","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:43:34Z/"}],"url":"https://support.zabbix.com/browse/ZBX-23230"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943865?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.0%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.0%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2023-32723"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xjj4-u4gj-x7ea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96181?format=json","vulnerability_id":"VCID-zc7p-7yts-5yae","summary":"The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42333","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2673","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26682","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26673","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26866","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26652","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2672","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2677","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26774","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32212","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32371","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32287","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32148","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3267","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32641","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32486","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42333"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42333","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42333"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689","reference_id":"1088689","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088689"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25629","reference_id":"ZBX-25629","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T14:54:27Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25629"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943885?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.45%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.45%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943881?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.5%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.5%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-42333"],"risk_score":0.7,"exploitability":"0.5","weighted_severity":"1.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zc7p-7yts-5yae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91988?format=json","vulnerability_id":"VCID-zemm-yb4a-4bc5","summary":"The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen.  NOTE: this attack is limited to attacks from trusted IP addresses.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4502","reference_id":"","reference_type":"","scores":[{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.98424","published_at":"2026-04-01T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.98427","published_at":"2026-04-02T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.9843","published_at":"2026-04-04T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.98432","published_at":"2026-04-07T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.98435","published_at":"2026-04-08T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.98436","published_at":"2026-04-09T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.98439","published_at":"2026-04-13T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.98443","published_at":"2026-04-16T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.98442","published_at":"2026-04-21T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.98445","published_at":"2026-04-29T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.98446","published_at":"2026-04-26T12:55:00Z"},{"value":"0.64138","scoring_system":"epss","scoring_elements":"0.9845","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4502"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4502"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613","reference_id":"562613","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562613"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/freebsd/remote/16918.rb","reference_id":"CVE-2009-4502;OSVDB-60956","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/freebsd/remote/16918.rb"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/10431.txt","reference_id":"CVE-2009-4502;OSVDB-60956","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/10431.txt"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943853?format=json","purl":"pkg:deb/debian/zabbix@1:1.8-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:1.8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943844?format=json","purl":"pkg:deb/debian/zabbix@1:6.0.14%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-172p-q6d5-9ya3"},{"vulnerability":"VCID-1xr6-n296-cyfd"},{"vulnerability":"VCID-3g1d-2tvh-akh4"},{"vulnerability":"VCID-3qru-uxsd-e3c8"},{"vulnerability":"VCID-464s-8ex9-kqdz"},{"vulnerability":"VCID-4s92-5es4-yka5"},{"vulnerability":"VCID-4uxg-fxv7-rua8"},{"vulnerability":"VCID-547a-p94b-6fep"},{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-5s7j-6aea-qucr"},{"vulnerability":"VCID-5t3e-bfve-d3he"},{"vulnerability":"VCID-673b-qsd3-e3hz"},{"vulnerability":"VCID-6u3x-x7qt-g3fa"},{"vulnerability":"VCID-76qf-8jm4-8kct"},{"vulnerability":"VCID-7bzf-3c9x-8qc4"},{"vulnerability":"VCID-7f3g-hebk-3qad"},{"vulnerability":"VCID-7yp1-231f-a3eq"},{"vulnerability":"VCID-9jfn-6nvg-a3b6"},{"vulnerability":"VCID-9z8h-gg7t-b7f8"},{"vulnerability":"VCID-aetr-jrab-6fg5"},{"vulnerability":"VCID-b8tm-2187-wkhz"},{"vulnerability":"VCID-batr-txtv-s3cf"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-cuqx-wxkd-nffa"},{"vulnerability":"VCID-d7uk-h423-77f5"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-ftt2-5jnt-9ye2"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-gp3f-yz9h-eqax"},{"vulnerability":"VCID-gyqk-zsww-ykdj"},{"vulnerability":"VCID-kx3g-p2zj-duaj"},{"vulnerability":"VCID-mhx5-hcg2-wfc4"},{"vulnerability":"VCID-n5md-76wa-dbaa"},{"vulnerability":"VCID-nrkb-pzcu-8ueg"},{"vulnerability":"VCID-nyhx-57xy-wugc"},{"vulnerability":"VCID-psak-h1x6-1kca"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r65p-6wkq-sfb9"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-ry8x-mjbp-qqct"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-sudd-unuw-wqa9"},{"vulnerability":"VCID-uh37-bv9z-1bdz"},{"vulnerability":"VCID-uxdf-6tyd-rucd"},{"vulnerability":"VCID-vkfp-asar-7bhw"},{"vulnerability":"VCID-wczj-cv1m-7qce"},{"vulnerability":"VCID-zc7p-7yts-5yae"},{"vulnerability":"VCID-zrfp-skzu-cbet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:6.0.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2009-4502"],"risk_score":1.2,"exploitability":"2.0","weighted_severity":"0.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zemm-yb4a-4bc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95947?format=json","vulnerability_id":"VCID-zrfp-skzu-cbet","summary":"When a URL is added to the map element, it is recorded in the database with sequential IDs. Upon adding a new URL, the system retrieves the last sysmapelementurlid value and increments it by one. However, an issue arises when a user manually changes the sysmapelementurlid value by adding sysmapelementurlid + 1. This action prevents others from adding URLs to the map element.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22117","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17581","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17675","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1763","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17488","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1797","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18024","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17723","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17811","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17871","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17887","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17844","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17795","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1774","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1775","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17788","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17698","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-22117"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22117","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22117"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.zabbix.com/browse/ZBX-25610","reference_id":"ZBX-25610","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-26T15:03:28Z/"}],"url":"https://support.zabbix.com/browse/ZBX-25610"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943846?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.8%2Bdfsg-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5nmy-hdh8-xbg1"},{"vulnerability":"VCID-cdyd-79m9-pyhv"},{"vulnerability":"VCID-dej6-dxbp-a3bt"},{"vulnerability":"VCID-fxqr-51kp-3ber"},{"vulnerability":"VCID-qzp5-px2f-vqc8"},{"vulnerability":"VCID-qzzk-mcfu-sfhv"},{"vulnerability":"VCID-r8yr-aet5-yydn"},{"vulnerability":"VCID-s1mb-1gsj-pbed"},{"vulnerability":"VCID-uh37-bv9z-1bdz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.8%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943876?format=json","purl":"pkg:deb/debian/zabbix@1:5.0.44%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:5.0.44%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943881?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.5%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.5%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943848?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943847?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1103100?format=json","purl":"pkg:deb/debian/zabbix@1:7.0.22%2Bdfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}],"aliases":["CVE-2024-22117"],"risk_score":0.7,"exploitability":"0.5","weighted_severity":"1.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zrfp-skzu-cbet"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/zabbix@1:7.0.22%252Bdfsg-1.1%3Fdistro=trixie"}