Description
|
|
A vulnerability has been identified in Zabbix, which could be exploited by attackers to execute arbitrary scripting code. This issue is caused by an input validation error in the "tr_status.php" script when processing the "filter_set", "show_details", "filter_rst", or "txt_select" parameters, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected site.
|