Логотип exploitDog
bind:CVE-2025-1196
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-1196

Количество 3

Количество 3

nvd логотип

CVE-2025-1196

12 месяцев назад

A vulnerability, which was classified as problematic, was found in code-projects Real Estate Property Management System 1.0. Affected is an unknown function of the file /search.php. The manipulation of the argument PropertyName leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

CVSS3: 3.5
EPSS: Низкий
github логотип

GHSA-m796-79h6-57c8

12 месяцев назад

A vulnerability, which was classified as problematic, was found in code-projects Real Estate Property Management System 1.0. Affected is an unknown function of the file /search.php. The manipulation of the argument PropertyName leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

CVSS3: 3.5
EPSS: Низкий
fstec логотип

BDU:2025-02205

около 1 года назад

Уязвимость сценария search.php системы управления недвижимостью Real Estate Property Management System, позволяющая нарушителю проводить межсайтовые сценарные атаки (XSS)

CVSS3: 3.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-1196

A vulnerability, which was classified as problematic, was found in code-projects Real Estate Property Management System 1.0. Affected is an unknown function of the file /search.php. The manipulation of the argument PropertyName leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

CVSS3: 3.5
0%
Низкий
12 месяцев назад
github логотип
GHSA-m796-79h6-57c8

A vulnerability, which was classified as problematic, was found in code-projects Real Estate Property Management System 1.0. Affected is an unknown function of the file /search.php. The manipulation of the argument PropertyName leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

CVSS3: 3.5
0%
Низкий
12 месяцев назад
fstec логотип
BDU:2025-02205

Уязвимость сценария search.php системы управления недвижимостью Real Estate Property Management System, позволяющая нарушителю проводить межсайтовые сценарные атаки (XSS)

CVSS3: 3.5
0%
Низкий
около 1 года назад

Уязвимостей на страницу