Cross-Site Scripting in FireEye EX, affecting version 9.0.3.936727. Exploitation of this vulnerability allows an attacker to send a specially crafted JavaScript payload via the 'type' and 's_f_name' parameters to an authenticated user to retrieve their session details.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-16113 | Cross-Site Scripting in FireEye EX, affecting version 9.0.3.936727. Exploitation of this vulnerability allows an attacker to send a specially crafted JavaScript payload via the 'type' and 's_f_name' parameters to an authenticated user to retrieve their session details. |
Fixes
Solution
The FireEye team is working on fixing the reported vulnerabilities. It is recommended to update affected products to the latest version available.
Workaround
No workaround given by the vendor.
References
History
Tue, 03 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-06-03T13:59:52.149Z
Reserved: 2024-01-08T11:56:03.531Z
Link: CVE-2024-0317
Updated: 2024-08-01T18:04:48.538Z
Status : Modified
Published: 2024-01-15T17:15:08.850
Modified: 2024-11-21T08:46:18.690
Link: CVE-2024-0317
No data.
OpenCVE Enrichment
No data.
EUVD