Vulnerabilities > Zabbix > Frontend > 6.0.16
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-12-18 | CVE-2023-32725 | Reliance on Cookies without Validation and Integrity Checking vulnerability in Zabbix Frontend and Zabbix Server The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. | 8.8 |
2023-08-03 | CVE-2023-30958 | Cross-site Scripting vulnerability in Zabbix Frontend A security defect was identified in Foundry Frontend that enabled users to potentially conduct DOM XSS attacks if Foundry's CSP were to be bypassed. This defect was resolved with the release of Foundry Frontend 6.225.0. | 6.1 |
2023-07-13 | CVE-2023-29454 | Cross-site Scripting vulnerability in Zabbix Frontend Stored or persistent cross-site scripting (XSS) is a type of XSS where the attacker first sends the payload to the web application, then the application saves the payload (e.g., in a database or server-side text files), and finally, the application unintentionally executes the payload for every victim visiting its web pages. | 5.4 |
2023-07-13 | CVE-2023-29456 | Cross-site Scripting vulnerability in Zabbix Frontend URL validation scheme receives input from a user and then parses it to identify its various components. | 5.4 |
2023-07-13 | CVE-2023-29457 | Cross-site Scripting vulnerability in Zabbix Frontend Reflected XSS attacks, occur when a malicious script is reflected off a web application to the victim's browser. | 6.1 |