A vulnerability was found in alwindoss akademy up to 35caccea888ed63d5489e211c99edff1f62efdba. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file cmd/akademy/handler/handlers.go. The manipulation of the argument emailAddress leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
References
Link | Resource |
---|---|
https://github.com/alwindoss/akademy/issues/1 | Exploit Issue Tracking |
https://vuldb.com/?ctiid.276487 | Exploit Issue Tracking Permissions Required Third Party Advisory |
https://vuldb.com/?id.276487 | Exploit Permissions Required Third Party Advisory |
https://vuldb.com/?submit.397340 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2024-09-04 14:15
Updated : 2024-09-05 14:48
NVD link : CVE-2024-8407
Mitre link : CVE-2024-8407
CVE.ORG link : CVE-2024-8407
JSON object : View
Products Affected
alwindoss
- akademy
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')