Emlog Pro har 2.4.1 /include/lib/common.php msg Cross Site Scripting
Gaskiya vulnerability da aka ware a matsayin karshewa an samu a Emlog Pro har 2.4.1. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren /include/lib/common.php, a cikin fayil $software_file, a cikin sashen $software_component. A sa manipulation of the argument msg ka Cross Site Scripting. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-79. Hakika, rauni an bayyana shi 12/20/2024 kamar emlog pro 2.4.1 has a reflected XSS vulnerability #306. An raba bayanin tsaro don saukewa a github.com. Wannan matsala ana saninta da CVE-2024-12845. Ngam yiɗi ka a tuma ndiyam ka nder internet. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga github.com. 0-day shima, an ndiyam a wuro be $0-$5k. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
3 Goyarwa · 88 Datenpunkte