CVE-2024-6892

Attackers can craft a malicious link that once clicked will execute arbitrary JavaScript in the context of the Journyx web application.
Configurations

Configuration 1 (hide)

cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:*:*:*

History

21 Nov 2024, 09:50

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Aug/7 -

06 Sep 2024, 16:33

Type Values Removed Values Added
CWE CWE-79
CPE cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:*:*:*
References () https://korelogic.com/Resources/Advisories/KL-001-2024-009.txt - () https://korelogic.com/Resources/Advisories/KL-001-2024-009.txt - Third Party Advisory
First Time Journyx
Journyx journyx

09 Aug 2024, 16:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1

08 Aug 2024, 13:04

Type Values Removed Values Added
Summary
  • (es) Los atacantes pueden crear un enlace malicioso que, una vez hecho clic, ejecutará JavaScript arbitrario en el contexto de la aplicación web Journyx.

08 Aug 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-08 00:15

Updated : 2024-11-21 09:50


NVD link : CVE-2024-6892

Mitre link : CVE-2024-6892

CVE.ORG link : CVE-2024-6892


JSON object : View

Products Affected

journyx

  • journyx
CWE
CWE-81

Improper Neutralization of Script in an Error Message Web Page

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')