Vulnerability Database

With exploit

zabbix / zabbix

Title Severity Exploit Date Affected Version
CVE-2017-2824 High May 24, 2017 == 2.4.2-rc1
== 2.4.0-rc3
== 2.4.9-rc1
== 2.4.0-rc1
== 2.4.4-rc1
== 2.4.6
== 2.4.0
== 2.4.3-rc1
== 2.4.5-rc1
== 2.4.2
== 2.4.6-rc1
== 2.4.1-rc2
== 2.4.8
== 2.4.5
== 2.4.3
== 2.4.9
== 2.4.7
== 2.4.8-rc1
== 2.4.7-rc1
== 2.4.0-rc2
== 2.4.1-rc1
== 2.4.4
== 2.4.1
CVE-2016-10134 Critical Feb 17, 2017 == 3.0.2
== 3.0.1
== 3.0.0
<= 2.2.13
== 3.0.3
CVE-2016-4338 High Jan 23, 2017 == 2.0.0
== 2.2.2
== 2.2.0
== 2.0.5
== 2.0.14
== 2.0.9
== 2.2.12
== 3.0.2
== 2.2.1
== 2.0.1
== 2.2.6
== 2.0.11
== 2.0.6
== 2.2.11
== 2.0.4
== 2.0.15
== 2.2.7
== 2.0.12
== 3.0.0
== 2.2.4
== 2.0.3
== 2.2.9
== 2.2.10
== 2.2.3
== 2.0.2
== 2.0.17
== 2.2.5
== 2.0.16
== 2.0.10
== 2.0.8
== 2.0.13
== 2.2.8
== 2.0.7
CVE-2014-9450 High Jan 2, 2015 == 2.0.9-rc1
== 2.0.1-rc2
== 2.2.7-rc1
== 2.0.4-rc1
== 2.0.5
== 2.0.12-rc1
== 2.2.3-rc2
== 2.2.2-rc3
== 2.2.7-rc2
== 2.0.6-rc1
== 2.0.3-rc1
== 2.2.0
== 2.2.0-rc1
== 2.0.1
== 2.2.6
== 2.0.10-rc1
== 2.0.11
== 2.0.6
== 2.2.2-rc2
== 2.2.2-rc1
== 2.0.4
== 2.2.4-rc1
== 2.2.6-rc1
== 2.2.7
== 2.2.1-rc1
== 2.0.12
== 2.0.11-rc2
<= 1.8.21
== 2.0.11-rc1
== 2.2.4-rc4
== 2.2.4
== 2.0.2-rc2
== 2.2.5-rc1
== 2.0.3
== 2.2.0-rc2
== 2.0.8-rc2
== 2.2.2
== 2.0.5-rc1
== 2.2.1
== 2.0.2
== 2.2.5
== 2.2.4-rc3
== 2.2.3-rc1
== 2.0.2-rc1
== 2.0.8-rc1
== 2.2.4-rc2
== 2.0.9-rc2
== 2.0.13-rc1
== 2.0.10
== 2.0.7-rc1
== 2.0.12-rc3
== 2.0.1-rc1
== 2.2.3
== 2.0.8
== 2.0.12-rc2
== 2.0.3-rc2
== 2.0.13
CVE-2014-1682 Low May 8, 2014 == 2.0.9-rc1
== 2.0.1-rc2
== 2.0.0
== 2.2.0
== 2.0.4-rc1
== 2.0.5
== 2.0.0-rc1
== 2.0.6-rc1
== 2.0.3-rc1
== 1.8.16
== 2.2.1
== 2.2.0-rc1
== 1.8.3-rc1
== 2.0.1
== 2.0.10-rc1
== 2.0.6
== 2.0.4
== 1.8.18
== 2.0.0-rc5
== 1.8
== 1.8.3-rc2
== 2.2.1-rc1
== 2.0.0-rc2
== 1.8.3-rc3
== 2.0.2-rc2
== 2.0.3
== 2.0.0-rc3
== 2.2.0-rc2
== 1.8.15-rc1
== 1.8.2
== 2.0.0-rc6
== 2.0.8-rc2
== 2.0.5-rc1
== 2.0.2
== 2.0.2-rc1
== 2.0.8-rc1
== 2.0.9-rc2
== 1.8.1
== 2.0.7-rc1
== 2.0.1-rc1
== 2.0.3-rc2
<= 1.8.19
== 2.0.0-rc4
CVE-2014-1685 Medium May 8, 2014 == 2.0.9-rc1
== 2.0.1-rc2
== 2.0.0
== 2.2.0
== 2.0.4-rc1
== 2.0.5
== 2.0.0-rc1
== 2.0.6-rc1
== 2.0.3-rc1
== 1.8.16
== 2.2.1
== 2.2.0-rc1
== 1.8.3-rc1
== 2.0.1
== 2.0.10-rc1
== 2.0.6
== 2.0.4
== 1.8.18
== 2.0.0-rc5
== 1.8
== 1.8.3-rc2
== 2.2.1-rc1
== 2.0.0-rc2
== 1.8.3-rc3
== 2.0.2-rc2
== 2.0.3
== 2.0.0-rc3
== 2.2.0-rc2
== 1.8.15-rc1
== 1.8.2
== 2.0.0-rc6
== 2.0.8-rc2
== 2.0.5-rc1
== 2.0.2
== 2.0.2-rc1
== 2.0.8-rc1
== 2.0.9-rc2
== 1.8.1
== 2.0.7-rc1
== 2.0.1-rc1
== 2.0.3-rc2
<= 1.8.19
== 2.0.0-rc4
CVE-2012-6086 Low Jan 29, 2014 == 2.0.1-rc2
== 2.0.0
== 2.0.5
== 2.0.0-rc1
== 1.8.10-rc2
== 1.8.16
== 2.0.1
== 2.0.6
== 2.0.4
== 2.0.0-rc5
== 2.0.0-rc2
== 2.1.0
== 2.0.3
== 2.0.0-rc3
== 1.8.15-rc1
== 2.0.0-rc6
== 2.0.2
== 1.8.1
== 2.1.1
== 2.0.1-rc1
== 1.8.10-rc1
== 2.0.0-rc4
CVE-2013-6824 High Dec 19, 2013 <= 1.8.18
== 2.0.0
== 2.2.0
CVE-2013-1364 Medium Dec 14, 2013 == 2.0.0
== 2.0.1
== 2.0.4
<= 1.8.15
== 2.0.3
== 2.0.2
CVE-2013-5572 Low Oct 1, 2013 == 2.0.5