A vulnerability, which was classified as problematic, was found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0. Affected is an unknown function of the file verification.php. The manipulation of the argument txtvaccinationID leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222852.
References
Link | Resource |
---|---|
https://github.com/E1CHO/cve_hub/blob/main/covid-19-vaccination%20vlun%20pdf/covid-19-vaccination%20xss(1).pdf | Exploit Third Party Advisory |
https://vuldb.com/?id.222852 | Permissions Required |
https://vuldb.com/?ctiid.222852 | Permissions Required |
Configurations
Configuration 1 (hide)
|
Information
Published : 2023-03-11 10:15
Updated : 2023-03-15 13:55
NVD link : CVE-2023-1353
Mitre link : CVE-2023-1353
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
design_and_implementation_of_covid-19_directory_on_vaccination_system_project
- design_and_implementation_of_covid-19_directory_on_vaccination_system