NA

CVE-2023-32725

Published: 18/12/2023 Updated: 22/12/2023
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

zabbix zabbix server 7.0.0

zabbix zabbix server

zabbix frontend 7.0.0

zabbix frontend

Github Repositories

Add a layer of active defense to your cloud applications.

cloud-active-defense Add a layer of active defense to your cloud applications Table of Contents About this project Requirements Quickstart Architecture and Philosophy Configuration and advanced topics Support, Feedback, Contributing Security / Disclosure Code of Conduct Licensing About this project Cloud active defense lets you deploy decoys right into your cloud application