First published: Sun Mar 02 2025(Updated: )
A vulnerability was found in Pixsoft Vivaz 6.0.11. It has been classified as problematic. Affected is an unknown function of the file /servlet?act=login&submit=1&evento=0&pixrnd=0125021817031859360231 of the component Login Endpoint. The manipulation of the argument sistema leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pixsoft Vivaz |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1810 is classified as a problematic vulnerability affecting the Login Endpoint of Pixsoft Vivaz 6.0.11.
To fix CVE-2025-1810, it is recommended to update Pixsoft Vivaz to a patched version that addresses this vulnerability.
CVE-2025-1810 affects the Login Endpoint functionality in Pixsoft Vivaz 6.0.11.
The vulnerability in CVE-2025-1810 is exploited through the manipulation of the 'sistema' argument during the login process.
Exploitation of CVE-2025-1810 could lead to unauthorized access or manipulation of user data within Pixsoft Vivaz.