CVE-2014-1682
08.05.2014, 14:29
The API in Zabbix before 1.8.20rc1, 2.0.x before 2.0.11rc1, and 2.2.x before 2.2.2rc1 allows remote authenticated users to spoof arbitrary users via the user name in a user.login request.Enginsight
Vendor | Product | Version |
---|---|---|
zabbix | zabbix | 𝑥 ≤ 1.8.19 |
zabbix | zabbix | 1.8 |
zabbix | zabbix | 1.8.1 |
zabbix | zabbix | 1.8.2 |
zabbix | zabbix | 1.8.3:rc1 |
zabbix | zabbix | 1.8.3:rc2 |
zabbix | zabbix | 1.8.3:rc3 |
zabbix | zabbix | 1.8.15:rc1 |
zabbix | zabbix | 1.8.16 |
zabbix | zabbix | 1.8.18 |
zabbix | zabbix | 2.0.0 |
zabbix | zabbix | 2.0.0:rc1 |
zabbix | zabbix | 2.0.0:rc2 |
zabbix | zabbix | 2.0.0:rc3 |
zabbix | zabbix | 2.0.0:rc4 |
zabbix | zabbix | 2.0.0:rc5 |
zabbix | zabbix | 2.0.0:rc6 |
zabbix | zabbix | 2.0.1 |
zabbix | zabbix | 2.0.1:rc1 |
zabbix | zabbix | 2.0.1:rc2 |
zabbix | zabbix | 2.0.2 |
zabbix | zabbix | 2.0.2:rc1 |
zabbix | zabbix | 2.0.2:rc2 |
zabbix | zabbix | 2.0.3 |
zabbix | zabbix | 2.0.3:rc1 |
zabbix | zabbix | 2.0.3:rc2 |
zabbix | zabbix | 2.0.4 |
zabbix | zabbix | 2.0.4:rc1 |
zabbix | zabbix | 2.0.5 |
zabbix | zabbix | 2.0.5:rc1 |
zabbix | zabbix | 2.0.6 |
zabbix | zabbix | 2.0.6:rc1 |
zabbix | zabbix | 2.0.7:rc1 |
zabbix | zabbix | 2.0.8:rc1 |
zabbix | zabbix | 2.0.8:rc2 |
zabbix | zabbix | 2.0.9:rc1 |
zabbix | zabbix | 2.0.9:rc2 |
zabbix | zabbix | 2.0.10:rc1 |
zabbix | zabbix | 2.2.0 |
zabbix | zabbix | 2.2.0:rc1 |
zabbix | zabbix | 2.2.0:rc2 |
zabbix | zabbix | 2.2.1 |
zabbix | zabbix | 2.2.1 |
zabbix | zabbix | 2.2.1:rc1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References