Логотип exploitDog
bind:CVE-2024-33536
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-33536

Количество 3

Количество 3

nvd логотип

CVE-2024-33536

больше 1 года назад

An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. The vulnerability occurs due to inadequate input validation of the res parameter, allowing an authenticated attacker to inject and execute arbitrary JavaScript code within the context of another user's browser session. By uploading a malicious JavaScript file, accessible externally, and crafting a URL containing its location in the res parameter, the attacker can exploit this vulnerability. Subsequently, when another user visits the crafted URL, the malicious JavaScript code is executed.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-cxhc-c4pj-cchp

больше 1 года назад

An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. The vulnerability occurs due to inadequate input validation of the res parameter, allowing an authenticated attacker to inject and execute arbitrary JavaScript code within the context of another user's browser session. By uploading a malicious JavaScript file, accessible externally, and crafting a URL containing its location in the res parameter, the attacker can exploit this vulnerability. Subsequently, when another user visits the crafted URL, the malicious JavaScript code is executed.

CVSS3: 5.4
EPSS: Низкий
fstec логотип

BDU:2024-10553

почти 2 года назад

Уязвимость компонента URL Handler корпоративной системы управления электронной почтой Zimbra Collaboration Suite (ZCS), связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю выполнить произвольный код

CVSS3: 5.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-33536

An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. The vulnerability occurs due to inadequate input validation of the res parameter, allowing an authenticated attacker to inject and execute arbitrary JavaScript code within the context of another user's browser session. By uploading a malicious JavaScript file, accessible externally, and crafting a URL containing its location in the res parameter, the attacker can exploit this vulnerability. Subsequently, when another user visits the crafted URL, the malicious JavaScript code is executed.

CVSS3: 5.4
0%
Низкий
больше 1 года назад
github логотип
GHSA-cxhc-c4pj-cchp

An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. The vulnerability occurs due to inadequate input validation of the res parameter, allowing an authenticated attacker to inject and execute arbitrary JavaScript code within the context of another user's browser session. By uploading a malicious JavaScript file, accessible externally, and crafting a URL containing its location in the res parameter, the attacker can exploit this vulnerability. Subsequently, when another user visits the crafted URL, the malicious JavaScript code is executed.

CVSS3: 5.4
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-10553

Уязвимость компонента URL Handler корпоративной системы управления электронной почтой Zimbra Collaboration Suite (ZCS), связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю выполнить произвольный код

CVSS3: 5.4
0%
Низкий
почти 2 года назад

Уязвимостей на страницу