From $url: Multiple cross-site scripting (XSS) vulnerabilities in the formatQuery function in frontends/php/include/classes/class.curl.php in Zabbix before 1.8.3rc1 allow remote attackers to inject arbitrary web script or HTML via the (1) filter_set, (2) show_details, (3) filter_rst, or (4) txt_select parameters to the triggers page (tr_status.php). NOTE: some of these details are obtained from third party information.
Arches, please test and mark stable: =net-analyzer/zabbix-1.8.3 Target keywords : "amd64 ppc x86"
x86 stable
amd64 done
*** Bug 335893 has been marked as a duplicate of this bug. ***
Marked ppc stable.
GLSA vote: NO Maintainers: Please remove vulnerable versions from the tree.
+ 12 Sep 2010; Patrick Lauer <patrick@gentoo.org> -zabbix-1.8-r1.ebuild, + -zabbix-1.8.1.ebuild, -zabbix-1.8.2.ebuild: + Remove old
No, too, closing noglsa.