Description
A vulnerability was found in Cogites eReserv 7.7.58 and classified as problematic. Affected by this issue is some unknown functionality of the file /front/admin/tenancyDetail.php. The manipulation of the argument Nom with the input Dreux"><script>alert('XSS')</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252302 is the identifier assigned to this vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-16805 | A vulnerability was found in Cogites eReserv 7.7.58 and classified as problematic. Affected by this issue is some unknown functionality of the file /front/admin/tenancyDetail.php. The manipulation of the argument Nom with the input Dreux"><script>alert('XSS')</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252302 is the identifier assigned to this vulnerability. |
References
| Link | Providers |
|---|---|
| https://vuldb.com/?ctiid.252302 |
|
| https://vuldb.com/?id.252302 |
|
History
No history.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-06-17T19:44:36.725Z
Reserved: 2024-01-29T13:35:23.571Z
Link: CVE-2024-1029
No data.
Status : Modified
Published: 2024-01-30T06:15:45.633
Modified: 2024-11-21T08:49:38.137
Link: CVE-2024-1029
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD