zabbix vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the zabbix package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Cross-site Scripting (XSS)

<1:3.0.32+dfsg-0+deb9u3
  • M
Cross-site Scripting (XSS)

<1:3.0.32+dfsg-0+deb9u3
  • M
Cross-site Scripting (XSS)

<1:3.0.32+dfsg-0+deb9u3
  • M
Improper Authentication

<1:3.0.32+dfsg-0+deb9u2
  • C
CVE-2020-11800

<1:3.0.31+dfsg-0+deb9u1
  • M
Cross-site Scripting (XSS)

<1:3.0.32+dfsg-0+deb9u1
  • C
Improper Input Validation

<1:2.0.7+dfsg-1
  • L
Inadequate Encryption Strength

*
  • L
Authorization Bypass Through User-Controlled Key

*
  • M
Information Exposure

<1:3.0.32+dfsg-0+deb9u1
  • M
Open Redirect

<1:3.0.31+dfsg-0+deb9u1
  • C
SQL Injection

<1:2.0.8+dfsg-2
  • H
CVE-2017-2825

<1:3.0.7+dfsg-3
  • L
Information Exposure

*
  • C
XML External Entity (XXE) Injection

<1:2.2.5+dfsg-1
  • H
OS Command Injection

<1:3.0.7+dfsg-3
  • C
SQL Injection

<1:3.0.4+dfsg-1
  • H
SQL Injection

<1:3.0.3+dfsg-1
  • H
SQL Injection

<1:2.2.7+dfsg-2
  • M
CVE-2014-1685

<1:2.2.2+dfsg-1
  • M
Improper Authentication

<1:2.2.2+dfsg-1
  • M
Cryptographic Issues

<1:2.0.7+dfsg-1
  • L
Arbitrary Code Injection

<1:2.2.0+dfsg-6
  • M
Improper Authentication

<1:2.0.4+dfsg-2
  • L
Access Restriction Bypass

<1:2.2.2+dfsg-1
  • H
SQL Injection

<1:2.0.2+dfsg-1
  • M
Cross-site Scripting (XSS)

<1:1.8.10-1
  • M
Cross-site Scripting (XSS)

<1:1.8.10-1
  • H
SQL Injection

<1:1.8.9-1
  • H
SQL Injection

<1:1.8.2-1
  • L
Information Exposure

<1:1.8.6-1
  • M
Information Exposure

<1:1.8.9-1
  • M
Cross-site Scripting (XSS)

<1:1.8.6-1
  • M
Resource Management Errors

<1:1.8.6-1
  • M
Cross-site Scripting (XSS)

<1:1.8.3-1
  • H
SQL Injection

<1:1.8.2-1
  • H
SQL Injection

<1:1.8-1
  • M
Out-of-Bounds

<1:1.8-1
  • M
OS Command Injection

<1:1.8-1
  • H
Access Restriction Bypass

<1:1.8-1
  • M
Out-of-Bounds

<1:1.8-1
  • L
CVE-2008-1353

<1:1.4.5-1
  • M
Configuration

<1:1.4.2-4
  • C
CVE-2007-0640

<1:1.1.4-8
  • M
CVE-2006-6692

<1:1.1.2-4
  • M
CVE-2006-6693

<1:1.1.2-4