Vulnerability Description
popup.php in Zabbix before 1.8.7 allows remote attackers to read the contents of arbitrary database tables via a modified srctbl parameter.
CVSS Score
5.0
MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zabbix | Zabbix | <= 1.8.6 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066092.
- http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066110.
- http://www.securityfocus.com/bid/49277
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69376
- https://support.zabbix.com/browse/ZBX-3840
- https://support.zabbix.com/browse/ZBX-3955
- http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066092.
- http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066110.
- http://www.securityfocus.com/bid/49277
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69376
- https://support.zabbix.com/browse/ZBX-3840
- https://support.zabbix.com/browse/ZBX-3955
FAQ
What is CVE-2011-3265?
CVE-2011-3265 is a vulnerability with a CVSS score of 5.0 (MEDIUM). popup.php in Zabbix before 1.8.7 allows remote attackers to read the contents of arbitrary database tables via a modified srctbl parameter.
How severe is CVE-2011-3265?
CVE-2011-3265 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-3265?
Check the references section above for vendor advisories and patch information. Affected products include: Zabbix Zabbix.