E-Mail containing malicious display-name information could trigger client-side script execution when using specific mobile devices. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. We now use safer methods of handling external content when embedding displayname information to the web interface. No publicly available exploits are known.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-20705 | E-Mail containing malicious display-name information could trigger client-side script execution when using specific mobile devices. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. We now use safer methods of handling external content when embedding displayname information to the web interface. No publicly available exploits are known. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2025-02-13T17:33:46.948Z
Reserved: 2024-01-12T07:03:12.862Z
Link: CVE-2024-23186
Updated: 2024-08-01T22:59:32.072Z
Status : Awaiting Analysis
Published: 2024-05-06T07:15:06.450
Modified: 2024-11-21T08:57:09.007
Link: CVE-2024-23186
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD