A vulnerability, which was classified as problematic, has been found in foxoverflow MySimplifiedSQL. This issue affects some unknown processing of the file MySimplifiedSQL_Examples.php. The manipulation of the argument FirstName/LastName leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 3b7481c72786f88041b7c2d83bb4f219f77f1293. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217595.
References
Link | Resource |
---|---|
https://vuldb.com/?ctiid.217595 | Third Party Advisory VDB Entry |
https://vuldb.com/?id.217595 | Permissions Required Third Party Advisory VDB Entry |
https://github.com/foxoverflow/MySimplifiedSQL/commit/3b7481c72786f88041b7c2d83bb4f219f77f1293 | Patch Third Party Advisory |
Configurations
Information
Published : 2023-01-07 01:15
Updated : 2023-01-12 08:56
NVD link : CVE-2015-10019
Mitre link : CVE-2015-10019
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
mysimplifiedsql_project
- mysimplifiedsql