A vulnerability, which was classified as problematic, was found in ZeroWdd myblog 1.0. Affected is the function update of the file src/main/java/com/wdd/myblog/controller/admin/BlogController.java. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/ZeroWdd/myblog/issues/4 | Exploit Issue Tracking |
https://github.com/ZeroWdd/myblog/issues/4#issue-2759845658 | Exploit Issue Tracking |
https://vuldb.com/?ctiid.290784 | Permissions Required VDB Entry |
https://vuldb.com/?id.290784 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.469232 | Third Party Advisory VDB Entry |
https://github.com/ZeroWdd/myblog/issues/4 | Exploit Issue Tracking |
Configurations
History
05 Jun 2025, 19:44
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:zerowdd:myblog:1.0:*:*:*:*:*:*:* | |
References | () https://github.com/ZeroWdd/myblog/issues/4 - Exploit, Issue Tracking | |
References | () https://github.com/ZeroWdd/myblog/issues/4#issue-2759845658 - Exploit, Issue Tracking | |
References | () https://vuldb.com/?ctiid.290784 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.290784 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.469232 - Third Party Advisory, VDB Entry | |
First Time |
Zerowdd
Zerowdd myblog |
09 Jan 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ZeroWdd/myblog/issues/4 - | |
Summary |
|
08 Jan 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-08 23:15
Updated : 2025-06-05 19:44
NVD link : CVE-2024-13192
Mitre link : CVE-2024-13192
CVE.ORG link : CVE-2024-13192
JSON object : View
Products Affected
zerowdd
- myblog