{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T12:37:04.754","vulnerabilities":[{"cve":{"id":"CVE-2023-32726","sourceIdentifier":"security@zabbix.com","published":"2023-12-18T10:15:06.750","lastModified":"2025-11-03T22:16:22.167","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server."},{"lang":"es","value":"La vulnerabilidad se debe a una verificación incorrecta de si RDLENGTH no desborda el búfer en respuesta del servidor DNS."}],"metrics":{"cvssMetricV31":[{"source":"security@zabbix.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L","baseScore":3.9,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":0.5,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}]},"weaknesses":[{"source":"security@zabbix.com","type":"Secondary","description":[{"lang":"en","value":"CWE-754"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-754"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix-agent:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndIncluding":"5.0.39","matchCriteriaId":"1D042C89-DB7A-476E-B02B-A39386189825"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix-agent:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndIncluding":"6.0.23","matchCriteriaId":"7E3A1180-2007-40CD-9AD2-EA904E222989"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix-agent:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4.0","versionEndIncluding":"6.4.8","matchCriteriaId":"6C295C3B-0788-4E5B-991E-8CAFE1365CCD"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix-agent:7.0.0:alpha1:*:*:*:*:*:*","matchCriteriaId":"725CFCBF-DF3B-4E94-8A56-AA2DA2F8462E"},{"vulnerable":true,"criteria":"cpe:2.3:a:zabbix:zabbix-agent:7.0.0:alpha6:*:*:*:*:*:*","matchCriteriaId":"4E2109D2-0986-43D0-9561-447DB52F137E"}]}]}],"references":[{"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html","source":"security@zabbix.com"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BYSYLA7VTHR25CBLYO5ZLEJFGU7HTHQB/","source":"security@zabbix.com"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMFKNV5E4LG2DIZNPRWQ2ENH75H6UEQT/","source":"security@zabbix.com"},{"url":"https://support.zabbix.com/browse/ZBX-23855","source":"security@zabbix.com","tags":["Vendor Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00000.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BYSYLA7VTHR25CBLYO5ZLEJFGU7HTHQB/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMFKNV5E4LG2DIZNPRWQ2ENH75H6UEQT/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://support.zabbix.com/browse/ZBX-23855","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}