CVE-2019-1246130.05.2019, 14:29Web Port 1.19.1 allows XSS via the /log type parameter.Cross-site ScriptingEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST6.1 MEDIUMNETWORKLOWNONECVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NmitreCNA------CVEADP------Base ScoreCVSS 3.xEPSS ScorePercentile: 97%VendorProductVersionwebportweb_port1.19.1𝑥= Vulnerable software versionsKnown Exploits!https://emreovunc.com/blog/en/WebPort-Reflected-XSS-02.pnghttps://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS/https://emreovunc.com/blog/en/WebPort-Reflected-XSS-02.pnghttps://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS/Common Weakness EnumerationCWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Referenceshttp://packetstormsecurity.com/files/158174/WebPort-1.19.1-Cross-Site-Scripting.htmlhttps://emreovunc.com/blog/en/WebPort-Reflected-XSS-02.pnghttps://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS/http://packetstormsecurity.com/files/158174/WebPort-1.19.1-Cross-Site-Scripting.htmlhttps://emreovunc.com/blog/en/WebPort-Reflected-XSS-02.pnghttps://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS/