Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/domainmod/domainmod/issues/175 |
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 15 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Domainmod
Domainmod domainmod |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Domainmod
Domainmod domainmod |
|
| Metrics |
cvssV3_1
|
Tue, 15 Oct 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In segments\edit.php of DomainMOD below v4.12.0, the segid parameter in the GET request can be exploited to cause a reflected Cross Site Scripting (XSS) vulnerability. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-15T17:49:49.981Z
Reserved: 2024-10-08T00:00:00.000Z
Link: CVE-2024-48624
Updated: 2024-10-15T17:42:08.039Z
Status : Analyzed
Published: 2024-10-15T16:15:05.840
Modified: 2025-05-06T18:02:02.760
Link: CVE-2024-48624
No data.
OpenCVE Enrichment
No data.