Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2022-1526

A vulnerability, which was classified as problematic, was found in Emlog Pro up to 1.2.2. This affects the POST parameter handling of articles. The manipulation with the input <script>alert(1);</script> leads to cross site scripting. It is possible to initiate the attack remotely but it requires a signup and login by the attacker. The exploit has been disclosed to the public and may be used.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 41.9%
CVSS Severity
CVSS v3 Score 3.5
CVSS v2 Score 3.5
Products affected by CVE-2022-1526
  • Emlog » Emlog » Version: N/A
    cpe:2.3:a:emlog:emlog:-
  • Emlog » Emlog » Version: 1.0.0
    cpe:2.3:a:emlog:emlog:1.0.0
  • Emlog » Emlog » Version: 1.0.1
    cpe:2.3:a:emlog:emlog:1.0.1
  • Emlog » Emlog » Version: 1.0.2
    cpe:2.3:a:emlog:emlog:1.0.2
  • Emlog » Emlog » Version: 1.0.3
    cpe:2.3:a:emlog:emlog:1.0.3
  • Emlog » Emlog » Version: 1.0.4
    cpe:2.3:a:emlog:emlog:1.0.4
  • Emlog » Emlog » Version: 1.0.5
    cpe:2.3:a:emlog:emlog:1.0.5
  • Emlog » Emlog » Version: 1.0.6
    cpe:2.3:a:emlog:emlog:1.0.6
  • Emlog » Emlog » Version: 1.0.7
    cpe:2.3:a:emlog:emlog:1.0.7
  • Emlog » Emlog » Version: 1.0.8
    cpe:2.3:a:emlog:emlog:1.0.8
  • Emlog » Emlog » Version: 1.1.0
    cpe:2.3:a:emlog:emlog:1.1.0
  • Emlog » Emlog » Version: 1.1.1
    cpe:2.3:a:emlog:emlog:1.1.1
  • Emlog » Emlog » Version: 1.2.0
    cpe:2.3:a:emlog:emlog:1.2.0
  • Emlog » Emlog » Version: 1.2.1
    cpe:2.3:a:emlog:emlog:1.2.1
  • Emlog » Emlog » Version: 1.2.2
    cpe:2.3:a:emlog:emlog:1.2.2


Contact Us

Shodan ® - All rights reserved