Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-23rc-p8q2-gh38

Опубликовано: 27 окт. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 5.1
CVSS3: 2.4

Описание

A vulnerability, which was classified as problematic, was found in PHPGurukul Vehicle Record System 1.0. This affects an unknown part of the file /admin/edit-brand.php. The manipulation of the argument Brand Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions the parameter "phone_number" to be affected. But this might be a mistake because the textbox field label is "Brand Name".

A vulnerability, which was classified as problematic, was found in PHPGurukul Vehicle Record System 1.0. This affects an unknown part of the file /admin/edit-brand.php. The manipulation of the argument Brand Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions the parameter "phone_number" to be affected. But this might be a mistake because the textbox field label is "Brand Name".

EPSS

Процентиль: 18%
0.00058
Низкий

5.1 Medium

CVSS4

2.4 Low

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 2.4
nvd
10 месяцев назад

A vulnerability, which was classified as problematic, was found in PHPGurukul Vehicle Record System 1.0. This affects an unknown part of the file /admin/edit-brand.php. The manipulation of the argument Brand Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions the parameter "phone_number" to be affected. But this might be a mistake because the textbox field label is "Brand Name".

EPSS

Процентиль: 18%
0.00058
Низкий

5.1 Medium

CVSS4

2.4 Low

CVSS3

Дефекты

CWE-79