"TITLE":"Emlog Pro POST Parameter cross site scripting",
"REQUESTER":"cna@vuldb.com",
"ASSIGNER":"cna@vuldb.com",
"STATE":"PUBLIC"
},
"generator":"vuldb.com",
"affects":{
"vendor":{
"vendor_data":[
{
"vendor_name":"",
"product":{
"product_data":[
{
"product_name":"Emlog Pro",
"version":{
"version_data":[
{
"version_value":"1.2.0"
},
{
"version_value":"1.2.1"
},
{
"version_value":"1.2.2"
}
]
}
}
]
}
}
]
}
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang":"eng",
"value":"CWE-79 Cross Site Scripting"
}
]
}
]
},
"description":{
"description_data":[
{
"lang":"eng",
"value":"A vulnerability, which was classified as problematic, was found in Emlog Pro up to 1.2.2. This affects the POST parameter handling of articles. The manipulation with the input <script>alert(1);</script> leads to cross site scripting. It is possible to initiate the attack remotely but it requires a signup and login by the attacker. The exploit has been disclosed to the public and may be used."