A vulnerability was found in Project Worlds Student Project Allocation System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file admin_login.php of the component Admin Login Module. The manipulation of the argument msg with the input test%22%3Cscript%3Ealert(%27Torada%27)%3C/script%3E leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-251549 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://torada.notion.site/Reflected-Cross-site-scripting-at-Project-Allocation-System-d94c7c489c2d48efa23b21a90dd0e03f?pvs=4 | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.251549 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.251549 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2024-01-19T17:31:04.756Z
Updated: 2024-01-19T17:31:04.756Z
Reserved: 2024-01-19T10:21:07.964Z
Link: CVE-2024-0726
JSON object: View
NVD Information
Status : Modified
Published: 2024-01-19T18:15:08.350
Modified: 2024-05-17T02:34:54.650
Link: CVE-2024-0726
JSON object: View
Redhat Information
No data.
CWE