Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-49266 | A vulnerability was found in SourceCodester PHP CRUD 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /endpoint/Add.php. The manipulation of the argument first_name/middle_name/last_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. |
Tue, 10 Sep 2024 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rems
Rems php Crud |
|
| CPEs | cpe:2.3:a:rems:php_crud:1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Rems
Rems php Crud |
Mon, 09 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 07 Sep 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in SourceCodester PHP CRUD 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /endpoint/Add.php. The manipulation of the argument first_name/middle_name/last_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | |
| Title | SourceCodester PHP CRUD Add.php cross site scripting | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-09-09T18:30:56.902Z
Reserved: 2024-09-06T21:36:36.091Z
Link: CVE-2024-8562
Updated: 2024-09-09T18:30:53.247Z
Status : Analyzed
Published: 2024-09-07T19:15:11.890
Modified: 2024-09-10T15:36:34.703
Link: CVE-2024-8562
No data.
OpenCVE Enrichment
No data.
EUVD