Vulnerability Description
Cross Site Scripting vulnerability found in Monitorr v.1.7.6 allows a remote attacker to execute arbitrary code via the title parameter of the post_receiver-services.php file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Monitorr | Monitorr | 1.7.6m |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/171705/Monitorr-1.7.6-Cross-Site-Scripting.Third Party AdvisoryVDB Entry
- https://github.com/MonitorrProduct
- https://github.com/Monitorr/MonitorrProduct
- https://github.com/Monitorr/Monitorr/blob/3ebfd915bfb02aae2ded08c5e4ba6b1bea3009Product
- https://twitter.com/retrymp3Third Party Advisory
- http://packetstormsecurity.com/files/171705/Monitorr-1.7.6-Cross-Site-Scripting.Third Party AdvisoryVDB Entry
- https://github.com/MonitorrProduct
- https://github.com/Monitorr/MonitorrProduct
- https://github.com/Monitorr/Monitorr/blob/3ebfd915bfb02aae2ded08c5e4ba6b1bea3009Product
- https://twitter.com/retrymp3Third Party Advisory
FAQ
What is CVE-2023-26776?
CVE-2023-26776 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Cross Site Scripting vulnerability found in Monitorr v.1.7.6 allows a remote attacker to execute arbitrary code via the title parameter of the post_receiver-services.php file.
How severe is CVE-2023-26776?
CVE-2023-26776 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-26776?
Check the references section above for vendor advisories and patch information. Affected products include: Monitorr Monitorr.