A vulnerability was found in Project Worlds Visitor Management System 1.0. It has been classified as problematic. Affected is an unknown function of the file dataset.php of the component URL Handler. The manipulation of the argument name with the input "><script>alert('torada')</script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-251376.
References
Link | Resource |
---|---|
https://torada.notion.site/XSS-at-datatest-php-660aabd1437d4df7a492d19a461a1f3c?pvs=4 | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.251376 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.251376 | Permissions Required Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2024-01-17T23:31:04.675Z
Updated: 2024-01-17T23:31:04.675Z
Reserved: 2024-01-17T14:02:43.455Z
Link: CVE-2024-0650
JSON object: View
NVD Information
Status : Modified
Published: 2024-01-18T00:15:38.183
Modified: 2024-05-17T02:34:50.433
Link: CVE-2024-0650
JSON object: View
Redhat Information
No data.
CWE