Improper neutralization of input in Checkmk before versions 2.3.0p16 and 2.2.0p34 allows attackers to craft malicious links that can facilitate phishing attacks.
2024-09-17T14:15:17.347
2024-12-11T03:01:28.130
Analyzed
CVSSv3.1: 6.1 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |