CodeAstro Simple Hospital Management System 1.0 POST Parameter /doctor.html First Name/Last name/Address Cross Site Scripting

Gaskiya vulnerability da aka ware a matsayin karshewa an samu a CodeAstro Simple Hospital Management System 1.0. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil /doctor.html, a cikin sashen POST Parameter Handler. A sa manipulation of the argument First Name/Last name/Address ka Cross Site Scripting. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-79. Hakika, rauni an bayyana shi 07/07/2025. An raba bayanin tsaro don saukewa a github.com. Wannan matsala ana saninta da CVE-2025-7153. Ngam yiɗi ka a tuma ndiyam ka nder waya. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga github.com. 0-day shima, an ndiyam a wuro be $0-$5k. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

2 Goyarwa · 57 Datenpunkte

FurɗeSúgá
07/07/2025 08:01
Gargadi 1/1
07/08/2025 03:23
software_vendorCodeAstroCodeAstro
software_nameSimple Hospital Management SystemSimple Hospital Management System
software_version1.01.0
software_componentPOST Parameter HandlerPOST Parameter Handler
software_file/doctor.html/doctor.html
software_argumentFirst Name/Last name/AddressFirst Name/Last name/Address
vulnerability_cweCWE-79 (Cross Site Scripting)CWE-79 (Cross Site Scripting)
vulnerability_risk11
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_uiRR
cvss3_vuldb_sUU
cvss3_vuldb_cNN
cvss3_vuldb_iLL
cvss3_vuldb_aNN
cvss3_vuldb_ePP
cvss3_vuldb_rcRR
advisory_urlhttps://github.com/Vanshdhawan188/Simple-Hospital-Management-System-in-Python-CodeAstro-Patients-Stored-XSS-Doctors-Page/blob/main/Simple-Hospital-Management-System-in-Python-CodeAstro-Patients-Stored-XSS-Doctors%20Page.mdhttps://github.com/Vanshdhawan188/Simple-Hospital-Management-System-in-Python-CodeAstro-Patients-Stored-XSS-Doctors-Page/blob/main/Simple-Hospital-Management-System-in-Python-CodeAstro-Patients-Stored-XSS-Doctors%20Page.md
exploit_availability11
exploit_publicity11
exploit_urlhttps://github.com/Vanshdhawan188/Simple-Hospital-Management-System-in-Python-CodeAstro-Patients-Stored-XSS-Doctors-Page/blob/main/Simple-Hospital-Management-System-in-Python-CodeAstro-Patients-Stored-XSS-Doctors%20Page.mdhttps://github.com/Vanshdhawan188/Simple-Hospital-Management-System-in-Python-CodeAstro-Patients-Stored-XSS-Doctors-Page/blob/main/Simple-Hospital-Management-System-in-Python-CodeAstro-Patients-Stored-XSS-Doctors%20Page.md
source_cveCVE-2025-7153CVE-2025-7153
cna_responsibleVulDBVulDB
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_ciNN
cvss2_vuldb_iiPP
cvss2_vuldb_aiNN
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_uiPP
cvss4_vuldb_vcNN
cvss4_vuldb_viLL
cvss4_vuldb_vaNN
cvss4_vuldb_ePP
cvss2_vuldb_auSS
cvss2_vuldb_rlNDND
cvss3_vuldb_prLL
cvss3_vuldb_rlXX
cvss4_vuldb_atNN
cvss4_vuldb_prLL
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore4.04.0
cvss2_vuldb_tempscore3.43.4
cvss3_vuldb_basescore3.53.5
cvss3_vuldb_tempscore3.23.2
cvss3_meta_basescore3.53.5
cvss3_meta_tempscore3.23.2
cvss4_vuldb_bscore5.15.1
cvss4_vuldb_btscore2.02.0
advisory_date1751839200 (07/07/2025)1751839200 (07/07/2025)
price_0day$0-$5k$0-$5k
euvd_idEUVD-2025-20325

Want to stay up to date on a daily basis?

Enable the mail alert feature now!