Cross-Site Scripting in FireEye EX, affecting version 9.0.3.936727. Exploitation of this vulnerability allows an attacker to send a specially crafted JavaScript payload via the 'type' and 's_f_name' parameters to an authenticated user to retrieve their session details.
Fixes

Solution

The FireEye team is working on fixing the reported vulnerabilities. It is recommended to update affected products to the latest version available.


Workaround

No workaround given by the vendor.

History

Tue, 03 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2025-06-03T13:59:52.149Z

Reserved: 2024-01-08T11:56:03.531Z

Link: CVE-2024-0317

cve-icon Vulnrichment

Updated: 2024-08-01T18:04:48.538Z

cve-icon NVD

Status : Modified

Published: 2024-01-15T17:15:08.850

Modified: 2024-11-21T08:46:18.690

Link: CVE-2024-0317

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.