Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 19 Sep 2024 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Opentibiabr
Opentibiabr myaac |
|
CPEs | cpe:2.3:a:opentibiabr:myaac:*:*:*:*:*:*:*:* | |
Vendors & Products |
Opentibiabr
Opentibiabr myaac |
Tue, 17 Sep 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 13 Sep 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability classified as problematic has been found in OpenTibiaBR MyAAC up to 0.8.16. Affected is an unknown function of the file system/pages/forum/new_post.php of the component Post Reply Handler. The manipulation of the argument post_topic leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The patch is identified as bf6ae3df0d32fa22552bb44ca4f8489a6e78cc1c. It is recommended to apply a patch to fix this issue. | |
Title | OpenTibiaBR MyAAC Post Reply new_post.php cross site scripting | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-09-16T17:45:16.384Z
Reserved: 2024-09-13T13:01:40.414Z
Link: CVE-2024-8783

Updated: 2024-09-16T17:45:13.396Z

Status : Analyzed
Published: 2024-09-13T19:15:18.120
Modified: 2024-09-19T01:38:57.033
Link: CVE-2024-8783

No data.

No data.