SourceCodester Profile Registration without Reload Refresh 1.0 Registration Form add.php full_name କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ

Dogoggorri kan akka ସମସ୍ୟାଜନକ jedhamuun ramadame SourceCodester Profile Registration without Reload Refresh 1.0 keessatti argameera. Miidhamni argame is hojii hin beekamne faayilii add.php keessa kutaa Registration Form keessa. Wanti jijjiirame irratti full_name gara କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ geessa. Rakkoo ibsuuf CWE yoo fayyadamte gara CWE-79 si geessa. Odeeffannoon kun yeroo 09/22/2024 maxxanfameera. Odeeffannoon kun buufachuuf github.com irratti argama. Dogoggorri kun CVE-2024-9092 jedhamee waamama. Weerara fageenya irraa jalqabuu ni danda'ama. Ibsa teeknikaa ni jira. Waan dabalataa ta’een, meeshaa balaa kana fayyadamuuf ni jira. Qorannoo miidhaa (exploit) uummataaf ifa taasifameera, kanaafis fayyadamuu ni danda'ama. Ammas, gatii exploit might be approx. USD $0-$5k yeroo ammaa irratti argamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ ta’uu isaa ibsameera. Exploit github.com irraa buufachuun ni danda'ama. Akka 0-daytti, gatiin isaa daldala dhoksaa keessatti $0-$5k akka ta'e tilmaamameera. If you want to get best quality of vulnerability data, you may have to visit VulDB.

4 ଆଡାପ୍ଟେସନ୍ · 79 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
09/22/2024 05:39 PM
ଅଦ୍ୟତନ 1/3
09/23/2024 04:06 AM
ଅଦ୍ୟତନ 2/3
09/23/2024 12:23 PM
ଅଦ୍ୟତନ 3/3
03/09/2025 06:14 PM
software_vendorSourceCodesterSourceCodesterSourceCodesterSourceCodester
software_nameProfile Registration without Reload RefreshProfile Registration without Reload RefreshProfile Registration without Reload RefreshProfile Registration without Reload Refresh
software_version1.01.01.01.0
software_componentRegistration FormRegistration FormRegistration FormRegistration Form
software_fileadd.phpadd.phpadd.phpadd.php
software_argumentfull_namefull_namefull_namefull_name
vulnerability_cweCWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)
vulnerability_risk1111
cvss3_vuldb_avNNNN
cvss3_vuldb_acLLLL
cvss3_vuldb_uiRRRR
cvss3_vuldb_sUUUU
cvss3_vuldb_cNNNN
cvss3_vuldb_iLLLL
cvss3_vuldb_aNNNN
cvss3_vuldb_ePPPP
cvss3_vuldb_rcRRRR
advisory_urlhttps://github.com/jadu101/CVE/blob/main/SourceCodester_Profile_Registration_add_php_XSS.mdhttps://github.com/jadu101/CVE/blob/main/SourceCodester_Profile_Registration_add_php_XSS.mdhttps://github.com/jadu101/CVE/blob/main/SourceCodester_Profile_Registration_add_php_XSS.mdhttps://github.com/jadu101/CVE/blob/main/SourceCodester_Profile_Registration_add_php_XSS.md
exploit_availability1111
exploit_publicity1111
exploit_urlhttps://github.com/jadu101/CVE/blob/main/SourceCodester_Profile_Registration_add_php_XSS.mdhttps://github.com/jadu101/CVE/blob/main/SourceCodester_Profile_Registration_add_php_XSS.mdhttps://github.com/jadu101/CVE/blob/main/SourceCodester_Profile_Registration_add_php_XSS.mdhttps://github.com/jadu101/CVE/blob/main/SourceCodester_Profile_Registration_add_php_XSS.md
source_cveCVE-2024-9092CVE-2024-9092CVE-2024-9092CVE-2024-9092
cna_responsibleVulDBVulDBVulDBVulDB
decision_summaryOther parameters might be affected as well.Other parameters might be affected as well.Other parameters might be affected as well.Other parameters might be affected as well.
cvss2_vuldb_avNNNN
cvss2_vuldb_acLLLL
cvss2_vuldb_ciNNNN
cvss2_vuldb_iiPPPP
cvss2_vuldb_aiNNNN
cvss2_vuldb_ePOCPOCPOCPOC
cvss2_vuldb_rcURURURUR
cvss4_vuldb_avNNNN
cvss4_vuldb_acLLLL
cvss4_vuldb_vcNNNN
cvss4_vuldb_viLLLL
cvss4_vuldb_vaNNNN
cvss4_vuldb_ePPPP
cvss2_vuldb_auSSSS
cvss2_vuldb_rlNDNDNDND
cvss3_vuldb_prLLLL
cvss3_vuldb_rlXXXX
cvss4_vuldb_atNNNN
cvss4_vuldb_prLLLL
cvss4_vuldb_uiNNNP
cvss4_vuldb_scNNNN
cvss4_vuldb_siNNNN
cvss4_vuldb_saNNNN
cvss2_vuldb_basescore4.04.04.04.0
cvss2_vuldb_tempscore3.43.43.43.4
cvss3_vuldb_basescore3.53.53.53.5
cvss3_vuldb_tempscore3.23.23.23.2
cvss3_meta_basescore3.53.53.53.5
cvss3_meta_tempscore3.23.33.33.3
cvss4_vuldb_bscore5.35.35.35.1
cvss4_vuldb_btscore2.12.12.12.0
advisory_date1726956000 (09/22/2024)1726956000 (09/22/2024)1726956000 (09/22/2024)1726956000 (09/22/2024)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability was found in SourceCodester Profile Registration without Reload Refresh 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file add.php of the component Registration Form. The manipulation of the argument full_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.A vulnerability was found in SourceCodester Profile Registration without Reload Refresh 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file add.php of the component Registration Form. The manipulation of the argument full_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.A vulnerability was found in SourceCodester Profile Registration without Reload Refresh 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file add.php of the component Registration Form. The manipulation of the argument full_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
cvss3_cna_avNNN
cvss3_cna_acLLL
cvss3_cna_prLLL
cvss3_cna_uiRRR
cvss3_cna_sUUU
cvss3_cna_cNNN
cvss3_cna_iLLL
cvss3_cna_aNNN
cvss3_cna_basescore3.53.53.5
cvss2_cna_avNNN
cvss2_cna_acLLL
cvss2_cna_auSSS
cvss2_cna_ciNNN
cvss2_cna_iiPPP
cvss2_cna_aiNNN
cvss2_cna_basescore444
cve_nvd_summaryesSe ha encontrado una vulnerabilidad en SourceCodester Profile Registration without Reload Refresh 1.0. Se ha calificado como problemática. Este problema afecta a una funcionalidad desconocida del archivo add.php del componente Registration Form. La manipulación del argumento full_name provoca cross site scripting. El ataque puede ejecutarse de forma remota. El exploit se ha hecho público y puede utilizarse. También pueden verse afectados otros parámetros.Se ha encontrado una vulnerabilidad en SourceCodester Profile Registration without Reload Refresh 1.0. Se ha calificado como problemática. Este problema afecta a una funcionalidad desconocida del archivo add.php del componente Registration Form. La manipulación del argumento full_name provoca cross site scripting. El ataque puede ejecutarse de forma remota. El exploit se ha hecho público y puede utilizarse. También pueden verse afectados otros parámetros.

Do you know our Splunk app?

Download it now for free!