1 results (0.002 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

A vulnerability classified as problematic was found in Zenoss Dashboard up to 1.3.4. Affected by this vulnerability is an unknown functionality of the file ZenPacks/zenoss/Dashboard/browser/resources/js/defaultportlets.js. The manipulation of the argument HTMLString leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.5 is able to address this issue. • https://github.com/zenoss/ZenPacks.zenoss.Dashboard/commit/f462285a0a2d7e1a9255b0820240b94a43b00a44 https://github.com/zenoss/ZenPacks.zenoss.Dashboard/pull/130 https://github.com/zenoss/ZenPacks.zenoss.Dashboard/releases/tag/1.3.5 https://vuldb.com/?ctiid.217153 https://vuldb.com/?id.217153 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •