CodeAstro Hospital Management System 1.0 Add Vendor Details Page his_admin_add_vendor.php v_name/v_adr/v_number/v_email/v_phone/v_desc କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ

Rakkoon nageenyaa kan ସମସ୍ୟାଜନକ jedhamuun beekamu CodeAstro Hospital Management System 1.0 keessatti argameera. Kan miidhamte is hojii hin beekamne faayilii /backend/admin/his_admin_add_vendor.php keessa kutaa Add Vendor Details Page keessa. Hojii jijjiirraa irratti gaggeeffame v_name/v_adr/v_number/v_email/v_phone/v_desc gara କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ geessa. CWE fayyadamuun rakkoo ibsuun gara CWE-79 geessa. Dadhabbii kana yeroo 11/25/2024 maxxanfameera. Odeeffannoon kun buufachuuf github.com irratti qoodameera. Dogoggorri kun akka CVE-2024-11677tti beekama. Yaaliin weeraraa fageenya irraa jalqabamuu ni danda'a. Faayidaaleen teeknikaa ni jiru. Waliigalatti, meeshaa balaa kana fayyadamuuf jiru. Qorannoo miidhaa (exploit) uummataaf ifoomameera fi fayyadamamuu danda'a. Amma, gatii ammee exploit might be approx. USD $0-$5k ta'uu danda'a. Akka ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee ibsameera. Carraa exploit kana github.com irraa buufachuun ni danda'ama. Akka 0-daytti, gatii daldalaa dhoksaa tilmaamame $0-$5k ta'ee ture. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

4 ଆଡାପ୍ଟେସନ୍ · 101 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
11/25/2024 03:50 PM
ଅଦ୍ୟତନ 1/3
11/25/2024 03:51 PM
ଅଦ୍ୟତନ 2/3
12/04/2024 11:46 PM
ଅଦ୍ୟତନ 3/3
02/23/2025 09:13 AM
software_vendorCodeAstroCodeAstroCodeAstroCodeAstro
software_nameHospital Management SystemHospital Management SystemHospital Management SystemHospital Management System
software_version1.01.01.01.0
software_componentAdd Vendor Details PageAdd Vendor Details PageAdd Vendor Details PageAdd Vendor Details Page
software_file/backend/admin/his_admin_add_vendor.php/backend/admin/his_admin_add_vendor.php/backend/admin/his_admin_add_vendor.php/backend/admin/his_admin_add_vendor.php
software_argumentv_name/v_adr/v_number/v_email/v_phone/v_descv_name/v_adr/v_number/v_email/v_phone/v_descv_name/v_adr/v_number/v_email/v_phone/v_descv_name/v_adr/v_number/v_email/v_phone/v_desc
vulnerability_cweCWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)
vulnerability_risk1111
cvss3_vuldb_avNNNN
cvss3_vuldb_acLLLL
cvss3_vuldb_uiRRRR
cvss3_vuldb_sUUUU
cvss3_vuldb_cNNNN
cvss3_vuldb_iLLLL
cvss3_vuldb_aNNNN
cvss3_vuldb_ePPPP
cvss3_vuldb_rcRRRR
advisory_urlhttps://github.com/EmilGallajov/zero-day/blob/main/codeastro_hms_stored_xss.mdhttps://github.com/EmilGallajov/zero-day/blob/main/codeastro_hms_stored_xss.mdhttps://github.com/EmilGallajov/zero-day/blob/main/codeastro_hms_stored_xss.mdhttps://github.com/EmilGallajov/zero-day/blob/main/codeastro_hms_stored_xss.md
exploit_availability1111
exploit_publicity1111
exploit_urlhttps://github.com/EmilGallajov/zero-day/blob/main/codeastro_hms_stored_xss.mdhttps://github.com/EmilGallajov/zero-day/blob/main/codeastro_hms_stored_xss.mdhttps://github.com/EmilGallajov/zero-day/blob/main/codeastro_hms_stored_xss.mdhttps://github.com/EmilGallajov/zero-day/blob/main/codeastro_hms_stored_xss.md
source_cveCVE-2024-11677CVE-2024-11677CVE-2024-11677CVE-2024-11677
cna_responsibleVulDBVulDBVulDBVulDB
cvss2_vuldb_avNNNN
cvss2_vuldb_acLLLL
cvss2_vuldb_ciNNNN
cvss2_vuldb_iiPPPP
cvss2_vuldb_aiNNNN
cvss2_vuldb_ePOCPOCPOCPOC
cvss2_vuldb_rcURURURUR
cvss4_vuldb_avNNNN
cvss4_vuldb_acLLLL
cvss4_vuldb_vcNNNN
cvss4_vuldb_viLLLL
cvss4_vuldb_vaNNNN
cvss4_vuldb_ePPPP
cvss2_vuldb_auSSSS
cvss2_vuldb_rlNDNDNDND
cvss3_vuldb_prLLLL
cvss3_vuldb_rlXXXX
cvss4_vuldb_atNNNN
cvss4_vuldb_prLLLL
cvss4_vuldb_uiNNNP
cvss4_vuldb_scNNNN
cvss4_vuldb_siNNNN
cvss4_vuldb_saNNNN
cvss2_vuldb_basescore4.04.04.04.0
cvss2_vuldb_tempscore3.43.43.43.4
cvss3_vuldb_basescore3.53.53.53.5
cvss3_vuldb_tempscore3.23.23.23.2
cvss3_meta_basescore3.53.54.14.1
cvss3_meta_tempscore3.23.24.04.0
cvss4_vuldb_bscore5.35.35.35.1
cvss4_vuldb_btscore2.12.12.12.0
advisory_date1732489200 (11/25/2024)1732489200 (11/25/2024)1732489200 (11/25/2024)1732489200 (11/25/2024)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
source_videolinkhttps://www.youtube.com/watch?v=UsScmd8Xzuwhttps://www.youtube.com/watch?v=UsScmd8Xzuwhttps://www.youtube.com/watch?v=UsScmd8Xzuw
cve_nvd_summaryA vulnerability was found in CodeAstro Hospital Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /backend/admin/his_admin_add_vendor.php of the component Add Vendor Details Page. The manipulation of the argument v_name/v_adr/v_number/v_email/v_phone/v_desc leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.A vulnerability was found in CodeAstro Hospital Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /backend/admin/his_admin_add_vendor.php of the component Add Vendor Details Page. The manipulation of the argument v_name/v_adr/v_number/v_email/v_phone/v_desc leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
cve_nvd_summaryesSe ha encontrado una vulnerabilidad en CodeAstro Hospital Management System 1.0. Se ha clasificado como problemática. Afecta a una parte desconocida del archivo /backend/admin/his_admin_add_vendor.php del componente Add Vendor Details Page. La manipulación del argumento v_name/v_adr/v_number/v_email/v_phone/v_desc provoca cross-site scripting. Es posible iniciar el ataque de forma remota. El exploit se ha hecho público y puede utilizarse.Se ha encontrado una vulnerabilidad en CodeAstro Hospital Management System 1.0. Se ha clasificado como problemática. Afecta a una parte desconocida del archivo /backend/admin/his_admin_add_vendor.php del componente Add Vendor Details Page. La manipulación del argumento v_name/v_adr/v_number/v_email/v_phone/v_desc provoca cross-site scripting. Es posible iniciar el ataque de forma remota. El exploit se ha hecho público y puede utilizarse.
cvss4_cna_avNN
cvss4_cna_acLL
cvss4_cna_atNN
cvss4_cna_prLL
cvss4_cna_uiNN
cvss4_cna_vcNN
cvss4_cna_viLL
cvss4_cna_vaNN
cvss4_cna_scNN
cvss4_cna_siNN
cvss4_cna_saNN
cvss4_cna_bscore5.35.3
cvss3_cna_avNN
cvss3_cna_acLL
cvss3_cna_prLL
cvss3_cna_uiRR
cvss3_cna_sUU
cvss3_cna_cNN
cvss3_cna_iLL
cvss3_cna_aNN
cvss3_cna_basescore3.53.5
cvss3_nvd_avNN
cvss3_nvd_acLL
cvss3_nvd_prLL
cvss3_nvd_uiRR
cvss3_nvd_sCC
cvss3_nvd_cLL
cvss3_nvd_iLL
cvss3_nvd_aNN
cvss3_nvd_basescore5.45.4
cvss2_cna_avNN
cvss2_cna_acLL
cvss2_cna_auSS
cvss2_cna_ciNN
cvss2_cna_iiPP
cvss2_cna_aiNN
cvss2_cna_basescore44

Want to stay up to date on a daily basis?

Enable the mail alert feature now!