Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4j8r-3vg3-2hg4

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In WEMS Limited Enterprise Manager 2.58, input passed to the GET parameter 'email' is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML code in a user's browser session in context of an affected site.

In WEMS Limited Enterprise Manager 2.58, input passed to the GET parameter 'email' is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML code in a user's browser session in context of an affected site.

EPSS

Процентиль: 47%
0.0024
Низкий

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.1
nvd
почти 5 лет назад

In WEMS Limited Enterprise Manager 2.58, input passed to the GET parameter 'email' is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML code in a user's browser session in context of an affected site.

EPSS

Процентиль: 47%
0.0024
Низкий

Дефекты

CWE-79