A vulnerability was found in Emlog Pro up to 2.4.1. It has been classified as problematic. This affects an unknown part of the file /admin/tag.php. The manipulation of the argument keyword leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/emlog/emlog/issues/305 | Exploit Issue Tracking Third Party Advisory |
https://vuldb.com/?ctiid.289077 | Permissions Required |
https://vuldb.com/?id.289077 | Third Party Advisory |
Configurations
History
07 Jan 2025, 18:58
Type | Values Removed | Values Added |
---|---|---|
First Time |
Emlog emlog
Emlog |
|
CPE | cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:* | |
References | () https://github.com/emlog/emlog/issues/305 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.289077 - Permissions Required | |
References | () https://vuldb.com/?id.289077 - Third Party Advisory |
20 Dec 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-20 19:15
Updated : 2025-01-07 18:58
NVD link : CVE-2024-12841
Mitre link : CVE-2024-12841
CVE.ORG link : CVE-2024-12841
JSON object : View
Products Affected
emlog
- emlog