Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
These vulnerabilities have been remediated in cumulative releases for versions 8.0, 8.5, and 9.0. Please be aware that WebCTRL and i-Vu versions 7.0, 6.5, and 6.1 are no longer supported. To safeguard against these vulnerabilities, upgrading to the latest WebCTRL and i-Vu software is strongly recommended.
Workaround
No workaround given by the vendor.
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Automatedlogic
Automatedlogic webctrl |
|
| Vendors & Products |
Automatedlogic
Automatedlogic webctrl |
Wed, 19 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Reflected XSS using a specific URL in Automated Logic WebCTRL and Carrier i-VU can allow delivery of malicious payload due to a specific GET parameter not being sanitized. | |
| Title | ALC WebCTRL Carrier i-Vu Reflected XSS due to unsanitized parameter | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Carrier
Published:
Updated: 2025-11-19T15:15:57.698Z
Reserved: 2024-09-06T16:01:34.807Z
Link: CVE-2024-8528
Updated: 2025-11-19T15:15:10.301Z
Status : Awaiting Analysis
Published: 2025-11-19T14:15:57.780
Modified: 2025-11-19T19:14:59.327
Link: CVE-2024-8528
No data.
OpenCVE Enrichment
Updated: 2025-11-24T09:10:21Z