Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-53561 | A reflected Cross-Site Scripting (XSS) vulnerability exists in /webscan/sqlmap/index.html in QingScan <=v1.8.0. The vulnerability is caused by improper input sanitization of the query parameter, allowing an attacker to inject malicious JavaScript payloads. When a victim accesses a crafted URL containing the malicious input, the script executes in the victim's browser context. |
| Link | Providers |
|---|---|
| https://github.com/78778443/QingScan/issues/41 |
|
Fri, 07 Feb 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
cvssV3_1
|
Fri, 07 Feb 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A reflected Cross-Site Scripting (XSS) vulnerability exists in /webscan/sqlmap/index.html in QingScan <=v1.8.0. The vulnerability is caused by improper input sanitization of the query parameter, allowing an attacker to inject malicious JavaScript payloads. When a victim accesses a crafted URL containing the malicious input, the script executes in the victim's browser context. | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-07T22:46:42.331Z
Reserved: 2025-01-09T00:00:00.000Z
Link: CVE-2024-57278
Updated: 2025-02-07T22:46:37.096Z
Status : Deferred
Published: 2025-02-07T22:15:13.433
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-57278
No data.
OpenCVE Enrichment
No data.
EUVD