ID4Portais in version < V.2022.837.002a returns message parameter unsanitized in the response, resulting in a HTML Injection vulnerability.
References
| Link | Resource |
|---|---|
| https://miguelsantareno.github.io/id4Portais.txt | Exploit Third Party Advisory |
| https://www.id4software.com/ | Broken Link |
Configurations
History
12 Aug 2024, 16:12
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Devlop.systems
Devlop.systems id4portais |
|
| References | () https://miguelsantareno.github.io/id4Portais.txt - Exploit, Third Party Advisory | |
| References | () https://www.id4software.com/ - Broken Link | |
| CWE | CWE-79 | |
| CPE | cpe:2.3:a:devlop.systems:id4portais:*:*:*:*:*:*:*:* |
07 Aug 2024, 16:35
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-233 | |
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
06 Aug 2024, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-08-06 14:16
Updated : 2024-08-12 16:12
NVD link : CVE-2023-40819
Mitre link : CVE-2023-40819
CVE.ORG link : CVE-2023-40819
JSON object : View
Products Affected
devlop.systems
- id4portais
