Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-5338

Опубликовано: 22 авг. 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 3.5

Описание

Multiple cross-site scripting (XSS) vulnerabilities in the multisite component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors to the (1) render_status_icons function in htmllib.py or (2) ajax_action function in actions.py.

РелизСтатусПримечание
devel

not-affected

code-not-present
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [code-not-present]]
lucid

DNE

precise

not-affected

code-not-present
trusty

not-affected

code-not-present
trusty/esm

DNE

trusty was not-affected [code-not-present]
upstream

needs-triage

Показывать по

EPSS

Процентиль: 52%
0.00288
Низкий

3.5 Low

CVSS2

Связанные уязвимости

redhat
почти 12 лет назад

Multiple cross-site scripting (XSS) vulnerabilities in the multisite component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors to the (1) render_status_icons function in htmllib.py or (2) ajax_action function in actions.py.

nvd
больше 11 лет назад

Multiple cross-site scripting (XSS) vulnerabilities in the multisite component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors to the (1) render_status_icons function in htmllib.py or (2) ajax_action function in actions.py.

debian
больше 11 лет назад

Multiple cross-site scripting (XSS) vulnerabilities in the multisite c ...

github
больше 3 лет назад

Multiple cross-site scripting (XSS) vulnerabilities in the multisite component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors to the (1) render_status_icons function in htmllib.py or (2) ajax_action function in actions.py.

EPSS

Процентиль: 52%
0.00288
Низкий

3.5 Low

CVSS2