Missing sanitation of inputs allowed arbitrary users to conduct a stored XSS attack that triggers for users that view a certain project
Advisories
Source ID Title
EUVD EUVD EUVD-2024-46079 Missing sanitation of inputs allowed arbitrary users to conduct a stored XSS attack that triggers for users that view a certain project
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 28 Nov 2024 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 28 Nov 2024 09:30:00 +0000

Type Values Removed Values Added
Description Missing sanitation of inputs allowed arbitrary users to conduct a stored XSS attack that triggers for users that view a certain project
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: suse

Published:

Updated: 2024-11-28T12:25:17.261Z

Reserved: 2024-11-06T12:19:57.723Z

Link: CVE-2024-52283

cve-icon Vulnrichment

Updated: 2024-11-28T12:24:33.996Z

cve-icon NVD

Status : Received

Published: 2024-11-28T10:15:08.543

Modified: 2024-11-28T10:15:08.543

Link: CVE-2024-52283

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses