Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/domainmod/domainmod/issues/176 |
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 15 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Domainmod
Domainmod domainmod |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Domainmod
Domainmod domainmod |
|
| Metrics |
cvssV3_1
|
Tue, 15 Oct 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In queue\index.php of DomainMOD below v4.12.0, the list_id and domain_id parameters in the GET request can be exploited to cause a reflected Cross Site Scripting (XSS). | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-15T20:24:04.284Z
Reserved: 2024-10-08T00:00:00.000Z
Link: CVE-2024-48623
Updated: 2024-10-15T20:22:02.526Z
Status : Analyzed
Published: 2024-10-15T16:15:05.767
Modified: 2025-05-06T18:13:17.157
Link: CVE-2024-48623
No data.
OpenCVE Enrichment
No data.