SourceCodester Best House Rental Management System 1.0 New Tenant Page /index.php?page=tenants Last Name/First Name/Middle Name କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ

Dogoggorri kan akka ସମସ୍ୟାଜନକ jedhamuun ramadame SourceCodester Best House Rental Management System 1.0 keessatti argameera. Kan miidhamte is hojii hin beekamne faayilii /index.php?page=tenants keessa kutaa New Tenant Page keessa. Hojii jijjiirraa irratti gaggeeffame Last Name/First Name/Middle Name gara କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ geessa. CWE fayyadamuun rakkoo ibsuun gara CWE-79 geessa. Dadhabbii kana yeroo 09/09/2024 maxxanfameera. Odeeffannoon kun buufachuuf drive.google.com irratti qoodameera. Dogoggorri kun akka CVE-2024-8610tti beekama. Yaaliin weeraraa fageenya irraa jalqabamuu ni danda'a. Faayidaaleen teeknikaa ni jiru. Waliigalatti, meeshaa balaa kana fayyadamuuf jiru. Qorannoo miidhaa (exploit) uummataaf ifoomameera fi fayyadamamuu danda'a. Amma, gatii ammee exploit might be approx. USD $0-$5k ta'uu danda'a. Akka ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee ibsameera. Carraa exploit kana drive.google.com irraa buufachuun ni danda'ama. Akka 0-daytti, gatii daldalaa dhoksaa tilmaamame $0-$5k ta'ee ture. VulDB is the best source for vulnerability data and more expert information about this specific topic.

5 ଆଡାପ୍ଟେସନ୍ · 89 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
09/09/2024 04:58 PM
ଅଦ୍ୟତନ 1/4
09/10/2024 09:22 AM
ଅଦ୍ୟତନ 2/4
09/10/2024 03:57 PM
ଅଦ୍ୟତନ 3/4
09/18/2024 12:14 AM
ଅଦ୍ୟତନ 4/4
03/10/2025 11:56 PM
software_vendorSourceCodesterSourceCodesterSourceCodesterSourceCodesterSourceCodester
software_nameBest House Rental Management SystemBest House Rental Management SystemBest House Rental Management SystemBest House Rental Management SystemBest House Rental Management System
software_version1.01.01.01.01.0
software_componentNew Tenant PageNew Tenant PageNew Tenant PageNew Tenant PageNew Tenant Page
software_file/index.php?page=tenants/index.php?page=tenants/index.php?page=tenants/index.php?page=tenants/index.php?page=tenants
software_argumentLast Name/First Name/Middle NameLast Name/First Name/Middle NameLast Name/First Name/Middle NameLast Name/First Name/Middle NameLast Name/First Name/Middle Name
vulnerability_cweCWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)
vulnerability_risk11111
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLLLLL
cvss3_vuldb_uiRRRRR
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iLLLLL
cvss3_vuldb_aNNNNN
cvss3_vuldb_ePPPPP
cvss3_vuldb_rcRRRRR
advisory_urlhttps://drive.google.com/file/d/1mB2ZNyWJDqJaZZro4qiMqovRO_qo4pss/view?usp=sharinghttps://drive.google.com/file/d/1mB2ZNyWJDqJaZZro4qiMqovRO_qo4pss/view?usp=sharinghttps://drive.google.com/file/d/1mB2ZNyWJDqJaZZro4qiMqovRO_qo4pss/view?usp=sharinghttps://drive.google.com/file/d/1mB2ZNyWJDqJaZZro4qiMqovRO_qo4pss/view?usp=sharinghttps://drive.google.com/file/d/1mB2ZNyWJDqJaZZro4qiMqovRO_qo4pss/view?usp=sharing
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://drive.google.com/file/d/1mB2ZNyWJDqJaZZro4qiMqovRO_qo4pss/view?usp=sharinghttps://drive.google.com/file/d/1mB2ZNyWJDqJaZZro4qiMqovRO_qo4pss/view?usp=sharinghttps://drive.google.com/file/d/1mB2ZNyWJDqJaZZro4qiMqovRO_qo4pss/view?usp=sharinghttps://drive.google.com/file/d/1mB2ZNyWJDqJaZZro4qiMqovRO_qo4pss/view?usp=sharinghttps://drive.google.com/file/d/1mB2ZNyWJDqJaZZro4qiMqovRO_qo4pss/view?usp=sharing
source_cveCVE-2024-8610CVE-2024-8610CVE-2024-8610CVE-2024-8610CVE-2024-8610
cna_responsibleVulDBVulDBVulDBVulDBVulDB
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiNNNNN
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcURURURURUR
cvss4_vuldb_avNNNNN
cvss4_vuldb_acLLLLL
cvss4_vuldb_prLLLLL
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viLLLLL
cvss4_vuldb_vaNNNNN
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSSSSS
cvss2_vuldb_rlNDNDNDNDND
cvss3_vuldb_rlXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_uiNNNNP
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore4.04.04.04.04.0
cvss2_vuldb_tempscore3.43.43.43.43.4
cvss3_vuldb_basescore3.53.53.53.53.5
cvss3_vuldb_tempscore3.23.23.23.23.2
cvss3_meta_basescore3.53.53.54.14.1
cvss3_meta_tempscore3.23.33.34.04.0
cvss4_vuldb_bscore5.35.35.35.35.1
cvss4_vuldb_btscore2.12.12.12.12.0
advisory_date1725832800 (09/09/2024)1725832800 (09/09/2024)1725832800 (09/09/2024)1725832800 (09/09/2024)1725832800 (09/09/2024)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability classified as problematic has been found in SourceCodester Best House Rental Management System 1.0. Affected is an unknown function of the file /index.php?page=tenants of the component New Tenant Page. The manipulation of the argument Last Name/First Name/Middle Name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.A vulnerability classified as problematic has been found in SourceCodester Best House Rental Management System 1.0. Affected is an unknown function of the file /index.php?page=tenants of the component New Tenant Page. The manipulation of the argument Last Name/First Name/Middle Name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.A vulnerability classified as problematic has been found in SourceCodester Best House Rental Management System 1.0. Affected is an unknown function of the file /index.php?page=tenants of the component New Tenant Page. The manipulation of the argument Last Name/First Name/Middle Name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.A vulnerability classified as problematic has been found in SourceCodester Best House Rental Management System 1.0. Affected is an unknown function of the file /index.php?page=tenants of the component New Tenant Page. The manipulation of the argument Last Name/First Name/Middle Name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
cvss3_cna_avNNNN
cvss3_cna_acLLLL
cvss3_cna_prLLLL
cvss3_cna_uiRRRR
cvss3_cna_sUUUU
cvss3_cna_cNNNN
cvss3_cna_iLLLL
cvss3_cna_aNNNN
cvss3_cna_basescore3.53.53.53.5
cvss2_cna_avNNNN
cvss2_cna_acLLLL
cvss2_cna_auSSSS
cvss2_cna_ciNNNN
cvss2_cna_iiPPPP
cvss2_cna_aiNNNN
cvss2_cna_basescore4444
cve_nvd_summaryesSe ha encontrado una vulnerabilidad clasificada como problemática en SourceCodester Best House Rental Management System 1.0. Se trata de una función desconocida del archivo /index.php?page=tenants del componente New Tenant Page. La manipulación del argumento Apellido/Nombre/Segundo nombre conduce a cross site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho público y puede utilizarse.Se ha encontrado una vulnerabilidad clasificada como problemática en SourceCodester Best House Rental Management System 1.0. Se trata de una función desconocida del archivo /index.php?page=tenants del componente New Tenant Page. La manipulación del argumento Apellido/Nombre/Segundo nombre conduce a cross site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho público y puede utilizarse.Se ha encontrado una vulnerabilidad clasificada como problemática en SourceCodester Best House Rental Management System 1.0. Se trata de una función desconocida del archivo /index.php?page=tenants del componente New Tenant Page. La manipulación del argumento Apellido/Nombre/Segundo nombre conduce a cross site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho público y puede utilizarse.
cvss3_nvd_avNN
cvss3_nvd_acLL
cvss3_nvd_prLL
cvss3_nvd_uiRR
cvss3_nvd_sCC
cvss3_nvd_cLL
cvss3_nvd_iLL
cvss3_nvd_aNN
cvss3_nvd_basescore5.45.4

Do you know our Splunk app?

Download it now for free!