CVE-2024-0650

A vulnerability was found in Project Worlds Visitor Management System 1.0. It has been classified as problematic. Affected is an unknown function of the file dataset.php of the component URL Handler. The manipulation of the argument name with the input "><script>alert('torada')</script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-251376.
References
Link Resource
https://torada.notion.site/XSS-at-datatest-php-660aabd1437d4df7a492d19a461a1f3c?pvs=4 Exploit Third Party Advisory
https://vuldb.com/?ctiid.251376 Permissions Required Third Party Advisory
https://vuldb.com/?id.251376 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:oretnom23:visitor_management_system:1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-01-18 00:15

Updated : 2024-05-17 02:34


NVD link : CVE-2024-0650

Mitre link : CVE-2024-0650

CVE.ORG link : CVE-2024-0650


JSON object : View

Products Affected

oretnom23

  • visitor_management_system
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')