A vulnerability was found in Project Worlds Visitor Management System 1.0. It has been classified as problematic. Affected is an unknown function of the file dataset.php of the component URL Handler. The manipulation of the argument name with the input "><script>alert('torada')</script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-251376.
References
Link Resource
https://torada.notion.site/XSS-at-datatest-php-660aabd1437d4df7a492d19a461a1f3c?pvs=4 Exploit Third Party Advisory
https://vuldb.com/?ctiid.251376 Permissions Required Third Party Advisory
https://vuldb.com/?id.251376 Permissions Required Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: VulDB

Published: 2024-01-17T23:31:04.675Z

Updated: 2024-01-17T23:31:04.675Z

Reserved: 2024-01-17T14:02:43.455Z


Link: CVE-2024-0650

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2024-01-18T00:15:38.183

Modified: 2024-05-17T02:34:50.433


Link: CVE-2024-0650

JSON object: View

cve-icon Redhat Information

No data.

CWE