ALT-PU-2014-2220-1
Closed vulnerabilities
Modified: 2025-04-12
CVE-2014-9450
Multiple SQL injection vulnerabilities in chart_bar.php in the frontend in Zabbix before 1.8.22, 2.0.x before 2.0.14, and 2.2.x before 2.2.8 allow remote attackers to execute arbitrary SQL commands via the (1) itemid or (2) periods parameter.
- http://secunia.com/advisories/61554
- http://www.zabbix.com/rn1.8.22.php
- http://www.zabbix.com/rn2.0.14.php
- http://www.zabbix.com/rn2.2.8.php
- https://support.zabbix.com/browse/ZBX-8582
- http://secunia.com/advisories/61554
- http://www.zabbix.com/rn1.8.22.php
- http://www.zabbix.com/rn2.0.14.php
- http://www.zabbix.com/rn2.2.8.php
- https://support.zabbix.com/browse/ZBX-8582
Modified: 2025-04-20
CVE-2016-10134
SQL injection vulnerability in Zabbix before 2.2.14 and 3.0 before 3.0.4 allows remote attackers to execute arbitrary SQL commands via the toggle_ids array parameter in latest.php.
- http://www.debian.org/security/2017/dsa-3802
- http://www.openwall.com/lists/oss-security/2017/01/12/4
- http://www.openwall.com/lists/oss-security/2017/01/13/4
- http://www.securityfocus.com/bid/95423
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936
- https://code610.blogspot.com/2017/10/zbx-11023-quick-autopsy.html
- https://support.zabbix.com/browse/ZBX-11023
- http://www.debian.org/security/2017/dsa-3802
- http://www.openwall.com/lists/oss-security/2017/01/12/4
- http://www.openwall.com/lists/oss-security/2017/01/13/4
- http://www.securityfocus.com/bid/95423
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936
- https://code610.blogspot.com/2017/10/zbx-11023-quick-autopsy.html
- https://support.zabbix.com/browse/ZBX-11023
Modified: 2024-11-21
CVE-2016-10742
Zabbix before 2.2.21rc1, 3.x before 3.0.13rc1, 3.1.x and 3.2.x before 3.2.10rc1, and 3.3.x and 3.4.x before 3.4.4rc1 allows open redirect via the request parameter.
- https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html
- https://support.zabbix.com/browse/ZBX-10272
- https://support.zabbix.com/browse/ZBX-13133
- https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html
- https://support.zabbix.com/browse/ZBX-10272
- https://support.zabbix.com/browse/ZBX-13133
Modified: 2025-04-20
CVE-2016-4338
The mysql user parameter configuration script (userparameter_mysql.conf) in the agent in Zabbix before 2.0.18, 2.2.x before 2.2.13, and 3.0.x before 3.0.3, when used with a shell other than bash, allows context-dependent attackers to execute arbitrary code or SQL commands via the mysql.size parameter.
- http://packetstormsecurity.com/files/136898/Zabbix-Agent-3.0.1-mysql.size-Shell-Command-Injection.html
- http://seclists.org/fulldisclosure/2016/May/9
- http://www.securityfocus.com/archive/1/538258/100/0/threaded
- http://www.securityfocus.com/bid/89631
- https://security.gentoo.org/glsa/201612-42
- https://support.zabbix.com/browse/ZBX-10741
- https://www.exploit-db.com/exploits/39769/
- https://www.zabbix.com/documentation/2.0/manual/introduction/whatsnew2018#miscellaneous_improvements
- https://www.zabbix.com/documentation/2.2/manual/introduction/whatsnew2213#miscellaneous_improvements
- https://www.zabbix.com/documentation/3.0/manual/introduction/whatsnew303#miscellaneous_improvements
- http://packetstormsecurity.com/files/136898/Zabbix-Agent-3.0.1-mysql.size-Shell-Command-Injection.html
- http://seclists.org/fulldisclosure/2016/May/9
- http://www.securityfocus.com/archive/1/538258/100/0/threaded
- http://www.securityfocus.com/bid/89631
- https://security.gentoo.org/glsa/201612-42
- https://support.zabbix.com/browse/ZBX-10741
- https://www.exploit-db.com/exploits/39769/
- https://www.zabbix.com/documentation/2.0/manual/introduction/whatsnew2018#miscellaneous_improvements
- https://www.zabbix.com/documentation/2.2/manual/introduction/whatsnew2213#miscellaneous_improvements
- https://www.zabbix.com/documentation/3.0/manual/introduction/whatsnew303#miscellaneous_improvements