ID4Portais in version < V.2022.837.002a returns message parameter unsanitized in the response, resulting in a HTML Injection vulnerability.
References
Link | Resource |
---|---|
https://miguelsantareno.github.io/id4Portais.txt | Exploit Third Party Advisory |
https://www.id4software.com/ | Broken Link |
Configurations
History
12 Aug 2024, 16:12
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-79 | |
First Time |
Devlop.systems
Devlop.systems id4portais |
|
CPE | cpe:2.3:a:devlop.systems:id4portais:*:*:*:*:*:*:*:* | |
References | () https://miguelsantareno.github.io/id4Portais.txt - Exploit, Third Party Advisory | |
References | () https://www.id4software.com/ - Broken Link |
07 Aug 2024, 16:35
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CWE | CWE-233 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
06 Aug 2024, 14:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-06 14:16
Updated : 2024-08-12 16:12
NVD link : CVE-2023-40819
Mitre link : CVE-2023-40819
CVE.ORG link : CVE-2023-40819
JSON object : View
Products Affected
devlop.systems
- id4portais