A vulnerability classified as problematic was found in Emlog Pro up to 2.4.1. Affected by this vulnerability is an unknown functionality in the library /include/lib/common.php. The manipulation of the argument msg leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/emlog/emlog/issues/306 | Exploit Issue Tracking Third Party Advisory |
https://vuldb.com/?ctiid.289081 | Permissions Required |
https://vuldb.com/?id.289081 | Third Party Advisory |
https://vuldb.com/?submit.462477 | Third Party Advisory |
Configurations
History
07 Jan 2025, 18:35
Type | Values Removed | Values Added |
---|---|---|
First Time |
Emlog emlog
Emlog |
|
References | () https://github.com/emlog/emlog/issues/306 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.289081 - Permissions Required | |
References | () https://vuldb.com/?id.289081 - Third Party Advisory | |
References | () https://vuldb.com/?submit.462477 - Third Party Advisory | |
CPE | cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:* |
20 Dec 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-20 22:15
Updated : 2025-01-07 18:35
NVD link : CVE-2024-12845
Mitre link : CVE-2024-12845
CVE.ORG link : CVE-2024-12845
JSON object : View
Products Affected
emlog
- emlog