The vulnerability allows an unauthenticated remote attacker to send malicious network requests containing arbitrary client-side script code and obtain its execution inside a victim’s session via a crafted URL, HTTP request, or simply by waiting for the victim to view the poisoned log.
This Cyber News was published on www.tenable.com. Publication date: Thu, 11 Jan 2024 10:41:03 +0000