Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-46079 | Missing sanitation of inputs allowed arbitrary users to conduct a stored XSS attack that triggers for users that view a certain project |
| Link | Providers |
|---|---|
| https://bugzilla.suse.com/show_bug.cgi?id=CVE-2024-52283 |
|
Thu, 28 Nov 2024 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 28 Nov 2024 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Missing sanitation of inputs allowed arbitrary users to conduct a stored XSS attack that triggers for users that view a certain project | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: suse
Published:
Updated: 2024-11-28T12:25:17.261Z
Reserved: 2024-11-06T12:19:57.723Z
Link: CVE-2024-52283
Updated: 2024-11-28T12:24:33.996Z
Status : Deferred
Published: 2024-11-28T10:15:08.543
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-52283
No data.
OpenCVE Enrichment
No data.
EUVD