Description
Cross-Site Scripting in FireEye EX, affecting version 9.0.3.936727. Exploitation of this vulnerability allows an attacker to send a specially crafted JavaScript payload via the 'type' and 's_f_name' parameters to an authenticated user to retrieve their session details.
No analysis available yet.
Remediation
Vendor Solution
The FireEye team is working on fixing the reported vulnerabilities. It is recommended to update affected products to the latest version available.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-16113 | Cross-Site Scripting in FireEye EX, affecting version 9.0.3.936727. Exploitation of this vulnerability allows an attacker to send a specially crafted JavaScript payload via the 'type' and 's_f_name' parameters to an authenticated user to retrieve their session details. |
References
History
Tue, 03 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-06-03T13:59:52.149Z
Reserved: 2024-01-08T11:56:03.531Z
Link: CVE-2024-0317
Updated: 2024-08-01T18:04:48.538Z
Status : Modified
Published: 2024-01-15T17:15:08.850
Modified: 2024-11-21T08:46:18.690
Link: CVE-2024-0317
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD