A vulnerability was found in Emlog Pro 2.2.10. It has been rated as problematic. This issue affects some unknown processing of the file /admin/tag.php of the component Post Tag Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-260603. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/fubxx/CVE/blob/main/Emlog-XSS2.md | Exploit |
https://vuldb.com/?ctiid.260603 | Permissions Required VDB Entry |
https://vuldb.com/?id.260603 | Permissions Required VDB Entry |
https://vuldb.com/?submit.311808 | Third Party Advisory VDB Entry |
https://github.com/fubxx/CVE/blob/main/Emlog-XSS2.md | Exploit |
https://vuldb.com/?ctiid.260603 | Permissions Required VDB Entry |
https://vuldb.com/?id.260603 | Permissions Required VDB Entry |
https://vuldb.com/?submit.311808 | Third Party Advisory VDB Entry |
Configurations
History
05 Mar 2025, 18:25
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:emlog:emlog:2.2.10:*:*:*:pro:*:*:* | |
First Time |
Emlog
Emlog emlog |
|
References | () https://github.com/fubxx/CVE/blob/main/Emlog-XSS2.md - Exploit | |
References | () https://vuldb.com/?ctiid.260603 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.260603 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?submit.311808 - Third Party Advisory, VDB Entry |
Information
Published : 2024-04-14 23:15
Updated : 2025-03-05 18:25
NVD link : CVE-2024-3763
Mitre link : CVE-2024-3763
CVE.ORG link : CVE-2024-3763
JSON object : View
Products Affected
emlog
- emlog
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')