Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-49158 | A vulnerability, which was classified as problematic, was found in LinuxOSsk Shakal-NG up to 1.3.3. Affected is an unknown function of the file comments/views.py. The manipulation of the argument next leads to open redirect. It is possible to launch the attack remotely. The name of the patch is ebd1c2cba59cbac198bf2fd5a10565994d4f02cb. It is recommended to apply a patch to fix this issue. |
Thu, 12 Sep 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linuxos
Linuxos shakal-ng |
|
| CPEs | cpe:2.3:a:linuxos:shakal-ng:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linuxos
Linuxos shakal-ng |
Wed, 04 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Sep 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability, which was classified as problematic, was found in LinuxOSsk Shakal-NG up to 1.3.3. Affected is an unknown function of the file comments/views.py. The manipulation of the argument next leads to open redirect. It is possible to launch the attack remotely. The name of the patch is ebd1c2cba59cbac198bf2fd5a10565994d4f02cb. It is recommended to apply a patch to fix this issue. | |
| Title | LinuxOSsk Shakal-NG views.py redirect | |
| Weaknesses | CWE-601 | |
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-09-04T15:43:55.055Z
Reserved: 2024-09-04T08:43:35.617Z
Link: CVE-2024-8412
Updated: 2024-09-04T15:43:50.538Z
Status : Analyzed
Published: 2024-09-04T16:15:09.393
Modified: 2024-09-12T16:47:19.140
Link: CVE-2024-8412
No data.
OpenCVE Enrichment
No data.
EUVD