{"uuid": "bdd8a0e0-fefe-401b-a712-75b5be9ae5a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50861", "type": "seen", "source": "https://t.me/cvedetector/15378", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50861 - \"GestiolP ip_mod_dns_key_form.cgi Stored XSS\"\", \n  \"Content\": \"CVE ID : CVE-2024-50861 \nPublished : Jan. 14, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : The ip_mod_dns_key_form.cgi request in GestiolP v3.5.7 is vulnerable to Stored XSS. An attacker can inject malicious code into the \"TSIG Key\" field, which is saved in the database and triggers XSS when viewed, enabling data exfiltration and CSRF attacks. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T00:03:21.000000Z"}