Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2011-4615

Опубликовано: 29 дек. 2011
Источник: nvd
CVSS2: 4.3
EPSS Низкий

Описание

Multiple cross-site scripting (XSS) vulnerabilities in Zabbix before 1.8.10 allow remote attackers to inject arbitrary web script or HTML via the gname parameter (aka host groups name) to (1) hostgroups.php and (2) usergrps.php, the update action to (3) hosts.php and (4) scripts.php, and (5) maintenance.php.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:zabbix:zabbix:*:rc2:*:*:*:*:*:*
Версия до 1.8.10 (включая)
cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.4:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.3:rc4:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.4:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.4:rc1:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.4:rc2:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.4:rc3:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.4:rc4:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.5:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.5:rc1:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.6:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.6:rc1:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.6:rc2:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.7:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.7:rc1:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.8:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.8:rc1:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.8:rc2:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.8:rc3:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.9:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.9:rc1:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.9:rc2:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:1.8.10:rc1:*:*:*:*:*:*

EPSS

Процентиль: 67%
0.00545
Низкий

4.3 Medium

CVSS2

Дефекты

CWE-79

Связанные уязвимости

ubuntu
около 14 лет назад

Multiple cross-site scripting (XSS) vulnerabilities in Zabbix before 1.8.10 allow remote attackers to inject arbitrary web script or HTML via the gname parameter (aka host groups name) to (1) hostgroups.php and (2) usergrps.php, the update action to (3) hosts.php and (4) scripts.php, and (5) maintenance.php.

debian
около 14 лет назад

Multiple cross-site scripting (XSS) vulnerabilities in Zabbix before 1 ...

github
больше 3 лет назад

Multiple cross-site scripting (XSS) vulnerabilities in Zabbix before 1.8.10 allow remote attackers to inject arbitrary web script or HTML via the gname parameter (aka host groups name) to (1) hostgroups.php and (2) usergrps.php, the update action to (3) hosts.php and (4) scripts.php, and (5) maintenance.php.

EPSS

Процентиль: 67%
0.00545
Низкий

4.3 Medium

CVSS2

Дефекты

CWE-79