Vulnerability Details CVE-2024-2171
A stored Cross-Site Scripting (XSS) vulnerability was identified in the zenml-io/zenml repository, specifically within the 'logo_url' field. By injecting malicious payloads into this field, an attacker could send harmful messages to other users, potentially compromising their accounts. The vulnerability affects version 0.55.3 and was fixed in version 0.56.2. The impact of exploiting this vulnerability could lead to user account compromise.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 27.6%
CVSS Severity
CVSS v3 Score 3.4
Products affected by CVE-2024-2171
-
-
cpe:2.3:a:zenml:zenml:0.1.0
-
cpe:2.3:a:zenml:zenml:0.1.1
-
cpe:2.3:a:zenml:zenml:0.1.2
-
cpe:2.3:a:zenml:zenml:0.1.3
-
cpe:2.3:a:zenml:zenml:0.1.4
-
cpe:2.3:a:zenml:zenml:0.1.5
-
cpe:2.3:a:zenml:zenml:0.10.0
-
cpe:2.3:a:zenml:zenml:0.11.0
-
cpe:2.3:a:zenml:zenml:0.12.0
-
cpe:2.3:a:zenml:zenml:0.13.0
-
cpe:2.3:a:zenml:zenml:0.13.1
-
cpe:2.3:a:zenml:zenml:0.13.2
-
cpe:2.3:a:zenml:zenml:0.2.0
-
cpe:2.3:a:zenml:zenml:0.20.0
-
cpe:2.3:a:zenml:zenml:0.20.1
-
cpe:2.3:a:zenml:zenml:0.20.2
-
cpe:2.3:a:zenml:zenml:0.20.3
-
cpe:2.3:a:zenml:zenml:0.20.4
-
cpe:2.3:a:zenml:zenml:0.20.5
-
cpe:2.3:a:zenml:zenml:0.21.0
-
cpe:2.3:a:zenml:zenml:0.21.1
-
cpe:2.3:a:zenml:zenml:0.22.0
-
cpe:2.3:a:zenml:zenml:0.23.0
-
cpe:2.3:a:zenml:zenml:0.3.0
-
cpe:2.3:a:zenml:zenml:0.3.1
-
cpe:2.3:a:zenml:zenml:0.3.2
-
cpe:2.3:a:zenml:zenml:0.3.3
-
cpe:2.3:a:zenml:zenml:0.3.4
-
cpe:2.3:a:zenml:zenml:0.3.5
-
cpe:2.3:a:zenml:zenml:0.3.6
-
cpe:2.3:a:zenml:zenml:0.3.6.1
-
cpe:2.3:a:zenml:zenml:0.3.7
-
cpe:2.3:a:zenml:zenml:0.3.7.1
-
cpe:2.3:a:zenml:zenml:0.3.8
-
cpe:2.3:a:zenml:zenml:0.3.9
-
cpe:2.3:a:zenml:zenml:0.30.0
-
cpe:2.3:a:zenml:zenml:0.31.0
-
cpe:2.3:a:zenml:zenml:0.31.1
-
cpe:2.3:a:zenml:zenml:0.32.0
-
cpe:2.3:a:zenml:zenml:0.32.1
-
cpe:2.3:a:zenml:zenml:0.33.0
-
cpe:2.3:a:zenml:zenml:0.34.0
-
cpe:2.3:a:zenml:zenml:0.35.0
-
cpe:2.3:a:zenml:zenml:0.35.1
-
cpe:2.3:a:zenml:zenml:0.36.0
-
cpe:2.3:a:zenml:zenml:0.36.1
-
cpe:2.3:a:zenml:zenml:0.37.0
-
cpe:2.3:a:zenml:zenml:0.38.0
-
cpe:2.3:a:zenml:zenml:0.39.0
-
cpe:2.3:a:zenml:zenml:0.39.1
-
cpe:2.3:a:zenml:zenml:0.40.0
-
cpe:2.3:a:zenml:zenml:0.40.1
-
cpe:2.3:a:zenml:zenml:0.40.2
-
cpe:2.3:a:zenml:zenml:0.40.3
-
cpe:2.3:a:zenml:zenml:0.41.0
-
cpe:2.3:a:zenml:zenml:0.42.0
-
cpe:2.3:a:zenml:zenml:0.42.1
-
cpe:2.3:a:zenml:zenml:0.42.2
-
cpe:2.3:a:zenml:zenml:0.43.0
-
cpe:2.3:a:zenml:zenml:0.43.1
-
cpe:2.3:a:zenml:zenml:0.44.0
-
cpe:2.3:a:zenml:zenml:0.44.1
-
cpe:2.3:a:zenml:zenml:0.44.2
-
cpe:2.3:a:zenml:zenml:0.44.3
-
cpe:2.3:a:zenml:zenml:0.44.4
-
cpe:2.3:a:zenml:zenml:0.45.0
-
cpe:2.3:a:zenml:zenml:0.45.1
-
cpe:2.3:a:zenml:zenml:0.45.2
-
cpe:2.3:a:zenml:zenml:0.45.3
-
cpe:2.3:a:zenml:zenml:0.45.4
-
cpe:2.3:a:zenml:zenml:0.45.5
-
cpe:2.3:a:zenml:zenml:0.45.6
-
cpe:2.3:a:zenml:zenml:0.46.0
-
cpe:2.3:a:zenml:zenml:0.46.1
-
cpe:2.3:a:zenml:zenml:0.47.0
-
cpe:2.3:a:zenml:zenml:0.5.0
-
cpe:2.3:a:zenml:zenml:0.5.1
-
cpe:2.3:a:zenml:zenml:0.5.2
-
cpe:2.3:a:zenml:zenml:0.5.3
-
cpe:2.3:a:zenml:zenml:0.5.4
-
cpe:2.3:a:zenml:zenml:0.5.5
-
cpe:2.3:a:zenml:zenml:0.5.6
-
cpe:2.3:a:zenml:zenml:0.5.7
-
cpe:2.3:a:zenml:zenml:0.50.0
-
cpe:2.3:a:zenml:zenml:0.51.0
-
cpe:2.3:a:zenml:zenml:0.52.0
-
cpe:2.3:a:zenml:zenml:0.53.0
-
cpe:2.3:a:zenml:zenml:0.53.1
-
cpe:2.3:a:zenml:zenml:0.54.0
-
cpe:2.3:a:zenml:zenml:0.54.1
-
cpe:2.3:a:zenml:zenml:0.55.0
-
cpe:2.3:a:zenml:zenml:0.55.1
-
cpe:2.3:a:zenml:zenml:0.55.2
-
cpe:2.3:a:zenml:zenml:0.55.3
-
cpe:2.3:a:zenml:zenml:0.55.4
-
cpe:2.3:a:zenml:zenml:0.55.5
-
cpe:2.3:a:zenml:zenml:0.56.0
-
cpe:2.3:a:zenml:zenml:0.56.1
-
cpe:2.3:a:zenml:zenml:0.6.0
-
cpe:2.3:a:zenml:zenml:0.6.1
-
cpe:2.3:a:zenml:zenml:0.6.2
-
cpe:2.3:a:zenml:zenml:0.6.3
-
cpe:2.3:a:zenml:zenml:0.7.0
-
cpe:2.3:a:zenml:zenml:0.7.1
-
cpe:2.3:a:zenml:zenml:0.7.2
-
cpe:2.3:a:zenml:zenml:0.7.3
-
cpe:2.3:a:zenml:zenml:0.8.0
-
cpe:2.3:a:zenml:zenml:0.8.1
-
cpe:2.3:a:zenml:zenml:0.9.0