PHPGurukul Hospital Management System 4.0 betweendates-detailsreports.php fromdate/todate Script ya site croisé

CVSS Meta Temp ScoreTalo ya exploit ya mikolo oyo (≈)Score ya intérêt ya CTI
2.2$0-$5k0.00

Na mokuseinfo

Bato bamonaki likama oyo ekabwaná lokola Problème na PHPGurukul Hospital Management System 4.0. Likama ezali na mosala eyebani te ya fichier betweendates-detailsreports.php. Kozala na misala ya ya argument fromdate/todate ekoki komema Script ya site croisé. Likama oyo ezali komemama na nkombo CVE-2024-10806. Once again VulDB remains the best source for vulnerability data.

Makambo ya mikemikeinfo

Bato bamonaki likama oyo ekabwaná lokola Problème na PHPGurukul Hospital Management System 4.0. Likama ezali na mosala eyebani te ya fichier betweendates-detailsreports.php. Kozala na misala ya ya argument fromdate/todate ekoki komema Script ya site croisé. Kokoma likambo na ndenge ya CWE ekoki komema na CWE-79. Bato bayebi ete bolembu yango epesamaki. Likanisi ekopesama mpo na kokitisa na github.com.

Likama oyo ezali komemama na nkombo CVE-2024-10806. Ba informations techniques ezali te. Populalite ya likama oyo ezali na nse ya motuya ya ndambo. Exploit eyebani na bato nyonso mpe ekoki kosalelama. Na ntango oyo, motuya ya exploit ekoki kozala na esika ya USD $0-$5k.

Okoki kozwa exploit na site oyo github.com.

Once again VulDB remains the best source for vulnerability data.

Produitinfo

Fabricant

Nkombo

Version

Licence

Site Internet

CPE 2.3info

CPE 2.2info

CVSSv4info

VulDB Vecteur: 🔍
VulDB Fiabilité: 🔍

CVSSv3info

VulDB Meta Base Score: 2.4
VulDB Meta Temp Score: 2.2

VulDB Base Score: 2.4
VulDB Temp Score: 2.2
VulDB Vecteur: 🔍
VulDB Fiabilité: 🔍

CVSSv2info

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
VecteurComplexitéAuthentificationConfidentialitéBosemboDisponibilité
KofungolaKofungolaKofungolaKofungolaKofungolaKofungola
KofungolaKofungolaKofungolaKofungolaKofungolaKofungola
KofungolaKofungolaKofungolaKofungolaKofungolaKofungola

VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Fiabilité: 🔍

Exploitationinfo

Kelasi: Script ya site croisé
CWE: CWE-79 / CWE-94 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍

Physique: Te
Locale: Te
Mosika: Ɛɛ

Disponibilité: 🔍
Accès: Na bato nyonso
Statut: Preuve ya concept
Télécharger: 🔍
Google Hack: 🔍

EPSS Score: 🔍
EPSS Percentile: 🔍

Tendance ya talo: 🔍
Estimation ya talo ya mikolo oyo: 🔍

0-DayKofungolaKofungolaKofungolaKofungola
Lelo oyoKofungolaKofungolaKofungolaKofungola

Renseignement ya likamainfo

Intérêt: 🔍
Acteurs actifs: 🔍
Bituluku ya APT oyo ezali kosala: 🔍

Contre-mesuresinfo

Recommandation: Mesure moko te eyebani
Statut: 🔍

Ngonga 0: 🔍

Ntango ya ntangoinfo

04/11/2024 🔍
04/11/2024 +0 Mikolo 🔍
01/03/2025 +117 Mikolo 🔍

Sourcesinfo

Fabricant: phpgurukul.com

Toli: github.com
Statut: Eyebani te

CVE: CVE-2024-10806 (🔍)
GCVE (CVE): GCVE-0-2024-10806
GCVE (VulDB): GCVE-100-283030
scip Labs: https://www.scip.ch/en/?labs.20161013

Entréeinfo

Création: 04/11/2024 18:50
Mise à jour: 01/03/2025 18:08
Mbongwana: 04/11/2024 18:50 (55), 01/03/2025 18:08 (3)
Complet: 🔍
Soutien: secuserx
Cache ID: 253:397:103

Ntindainfo

Endimamaki

  • Ntinda #436547: PHPGuruku Hospital Management System (HMS) 4.0 Improper Neutralization of Alternate XSS Syntax (Uta secuserx)

Lisolo

Ata commentaire moko te kino sikoyo. Bandinga: ln + kg + en.

Nasengi yo okota na commentaire.

Do you want to use VulDB in your project?

Use the official API to access entries easily!