CVE-2011-3264

Source
https://nvd.nist.gov/vuln/detail/CVE-2011-3264
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2011-3264.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2011-3264
Published
2011-08-19T21:55:02Z
Modified
2025-04-11T00:51:21Z
Summary
[none]
Details

Zabbix before 1.8.6 allows remote attackers to obtain sensitive information via an invalid srcfld2 parameter to popup.php, which reveals the installation path in an error message.

References

Affected packages

Debian:11 / zabbix

Package

Name
zabbix
Purl
pkg:deb/debian/zabbix?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.8.6-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / zabbix

Package

Name
zabbix
Purl
pkg:deb/debian/zabbix?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.8.6-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / zabbix

Package

Name
zabbix
Purl
pkg:deb/debian/zabbix?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.8.6-1

Ecosystem specific

{
    "urgency": "unimportant"
}