Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Zenoss Dashboard defaultportlets.js cross site scripting
Vulnerability Description
A vulnerability classified as problematic was found in Zenoss Dashboard up to 1.3.4. Affected by this vulnerability is an unknown functionality of the file ZenPacks/zenoss/Dashboard/browser/resources/js/defaultportlets.js. The manipulation of the argument HTMLString leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.5 is able to address this issue. The identifier of the patch is f462285a0a2d7e1a9255b0820240b94a43b00a44. It is recommended to upgrade the affected component. The identifier VDB-217153 was assigned to this vulnerability.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
Zenoss 跨站脚本漏洞
Vulnerability Description
Zenoss是美国Zenoss公司的一套开源的企业级IT管理和监控软件。该软件提供事件管理、网络服务监控、主机资源监控和网络设备的可用性监控等功能。 Zenoss 1.3.4版本及之前版本存在跨站脚本漏洞,该漏洞源于对参数HTMLString的错误操作导致跨站点脚本编写。
CVSS Information
N/A
Vulnerability Type
N/A