Vulnerability Details CVE-2024-2383
A clickjacking vulnerability exists in zenml-io/zenml versions up to and including 0.55.5 due to the application's failure to set appropriate X-Frame-Options or Content-Security-Policy HTTP headers. This vulnerability allows an attacker to embed the application UI within an iframe on a malicious page, potentially leading to unauthorized actions by tricking users into interacting with the interface under the attacker's control. The issue was addressed in version 0.56.3.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 27.6%
CVSS Severity
CVSS v3 Score 4.3
Products affected by CVE-2024-2383
-
-
cpe:2.3:a:zenml:zenml:0.1.0
-
cpe:2.3:a:zenml:zenml:0.1.1
-
cpe:2.3:a:zenml:zenml:0.1.2
-
cpe:2.3:a:zenml:zenml:0.1.3
-
cpe:2.3:a:zenml:zenml:0.1.4
-
cpe:2.3:a:zenml:zenml:0.1.5
-
cpe:2.3:a:zenml:zenml:0.10.0
-
cpe:2.3:a:zenml:zenml:0.11.0
-
cpe:2.3:a:zenml:zenml:0.12.0
-
cpe:2.3:a:zenml:zenml:0.13.0
-
cpe:2.3:a:zenml:zenml:0.13.1
-
cpe:2.3:a:zenml:zenml:0.13.2
-
cpe:2.3:a:zenml:zenml:0.2.0
-
cpe:2.3:a:zenml:zenml:0.20.0
-
cpe:2.3:a:zenml:zenml:0.20.1
-
cpe:2.3:a:zenml:zenml:0.20.2
-
cpe:2.3:a:zenml:zenml:0.20.3
-
cpe:2.3:a:zenml:zenml:0.20.4
-
cpe:2.3:a:zenml:zenml:0.20.5
-
cpe:2.3:a:zenml:zenml:0.21.0
-
cpe:2.3:a:zenml:zenml:0.21.1
-
cpe:2.3:a:zenml:zenml:0.22.0
-
cpe:2.3:a:zenml:zenml:0.23.0
-
cpe:2.3:a:zenml:zenml:0.3.0
-
cpe:2.3:a:zenml:zenml:0.3.1
-
cpe:2.3:a:zenml:zenml:0.3.2
-
cpe:2.3:a:zenml:zenml:0.3.3
-
cpe:2.3:a:zenml:zenml:0.3.4
-
cpe:2.3:a:zenml:zenml:0.3.5
-
cpe:2.3:a:zenml:zenml:0.3.6
-
cpe:2.3:a:zenml:zenml:0.3.6.1
-
cpe:2.3:a:zenml:zenml:0.3.7
-
cpe:2.3:a:zenml:zenml:0.3.7.1
-
cpe:2.3:a:zenml:zenml:0.3.8
-
cpe:2.3:a:zenml:zenml:0.3.9
-
cpe:2.3:a:zenml:zenml:0.30.0
-
cpe:2.3:a:zenml:zenml:0.31.0
-
cpe:2.3:a:zenml:zenml:0.31.1
-
cpe:2.3:a:zenml:zenml:0.32.0
-
cpe:2.3:a:zenml:zenml:0.32.1
-
cpe:2.3:a:zenml:zenml:0.33.0
-
cpe:2.3:a:zenml:zenml:0.34.0
-
cpe:2.3:a:zenml:zenml:0.35.0
-
cpe:2.3:a:zenml:zenml:0.35.1
-
cpe:2.3:a:zenml:zenml:0.36.0
-
cpe:2.3:a:zenml:zenml:0.36.1
-
cpe:2.3:a:zenml:zenml:0.37.0
-
cpe:2.3:a:zenml:zenml:0.38.0
-
cpe:2.3:a:zenml:zenml:0.39.0
-
cpe:2.3:a:zenml:zenml:0.39.1
-
cpe:2.3:a:zenml:zenml:0.40.0
-
cpe:2.3:a:zenml:zenml:0.40.1
-
cpe:2.3:a:zenml:zenml:0.40.2
-
cpe:2.3:a:zenml:zenml:0.40.3
-
cpe:2.3:a:zenml:zenml:0.41.0
-
cpe:2.3:a:zenml:zenml:0.42.0
-
cpe:2.3:a:zenml:zenml:0.42.1
-
cpe:2.3:a:zenml:zenml:0.42.2
-
cpe:2.3:a:zenml:zenml:0.43.0
-
cpe:2.3:a:zenml:zenml:0.43.1
-
cpe:2.3:a:zenml:zenml:0.44.0
-
cpe:2.3:a:zenml:zenml:0.44.1
-
cpe:2.3:a:zenml:zenml:0.44.2
-
cpe:2.3:a:zenml:zenml:0.44.3
-
cpe:2.3:a:zenml:zenml:0.44.4
-
cpe:2.3:a:zenml:zenml:0.45.0
-
cpe:2.3:a:zenml:zenml:0.45.1
-
cpe:2.3:a:zenml:zenml:0.45.2
-
cpe:2.3:a:zenml:zenml:0.45.3
-
cpe:2.3:a:zenml:zenml:0.45.4
-
cpe:2.3:a:zenml:zenml:0.45.5
-
cpe:2.3:a:zenml:zenml:0.45.6
-
cpe:2.3:a:zenml:zenml:0.46.0
-
cpe:2.3:a:zenml:zenml:0.46.1
-
cpe:2.3:a:zenml:zenml:0.47.0
-
cpe:2.3:a:zenml:zenml:0.5.0
-
cpe:2.3:a:zenml:zenml:0.5.1
-
cpe:2.3:a:zenml:zenml:0.5.2
-
cpe:2.3:a:zenml:zenml:0.5.3
-
cpe:2.3:a:zenml:zenml:0.5.4
-
cpe:2.3:a:zenml:zenml:0.5.5
-
cpe:2.3:a:zenml:zenml:0.5.6
-
cpe:2.3:a:zenml:zenml:0.5.7
-
cpe:2.3:a:zenml:zenml:0.50.0
-
cpe:2.3:a:zenml:zenml:0.51.0
-
cpe:2.3:a:zenml:zenml:0.52.0
-
cpe:2.3:a:zenml:zenml:0.53.0
-
cpe:2.3:a:zenml:zenml:0.53.1
-
cpe:2.3:a:zenml:zenml:0.54.0
-
cpe:2.3:a:zenml:zenml:0.54.1
-
cpe:2.3:a:zenml:zenml:0.55.0
-
cpe:2.3:a:zenml:zenml:0.55.1
-
cpe:2.3:a:zenml:zenml:0.55.2
-
cpe:2.3:a:zenml:zenml:0.55.3
-
cpe:2.3:a:zenml:zenml:0.55.4
-
cpe:2.3:a:zenml:zenml:0.55.5
-
cpe:2.3:a:zenml:zenml:0.56.0
-
cpe:2.3:a:zenml:zenml:0.56.1
-
cpe:2.3:a:zenml:zenml:0.56.2
-
cpe:2.3:a:zenml:zenml:0.6.0
-
cpe:2.3:a:zenml:zenml:0.6.1
-
cpe:2.3:a:zenml:zenml:0.6.2
-
cpe:2.3:a:zenml:zenml:0.6.3
-
cpe:2.3:a:zenml:zenml:0.7.0
-
cpe:2.3:a:zenml:zenml:0.7.1
-
cpe:2.3:a:zenml:zenml:0.7.2
-
cpe:2.3:a:zenml:zenml:0.7.3
-
cpe:2.3:a:zenml:zenml:0.8.0
-
cpe:2.3:a:zenml:zenml:0.8.1
-
cpe:2.3:a:zenml:zenml:0.9.0