Metrics
Affected Vendors & Products
Wed, 30 Oct 2024 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Projectworlds simple Web-based Chat Application
|
|
CPEs | cpe:2.3:a:projectworlds:simple_web-based_chat_application:1.0:*:*:*:*:*:*:* | |
Vendors & Products |
Projectworlds simple Web-based Chat Application
|
Mon, 28 Oct 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Projectworlds
Projectworlds simple Web Based Chat Application |
|
CPEs | cpe:2.3:a:projectworlds:simple_web_based_chat_application:*:*:*:*:*:*:*:* | |
Vendors & Products |
Projectworlds
Projectworlds simple Web Based Chat Application |
|
Metrics |
ssvc
|
Mon, 28 Oct 2024 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in Project Worlds Simple Web-Based Chat Application 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument Name/Comment leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions different parameters to be affected which do not correlate with the screenshots of a successful attack. | |
Title | Project Worlds Simple Web-Based Chat Application index.php cross site scripting | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2024-10-28T00:00:09.444Z
Updated: 2024-10-28T13:03:15.189Z
Reserved: 2024-10-27T07:14:19.320Z
Link: CVE-2024-10433
Updated: 2024-10-28T13:03:09.812Z
Status : Analyzed
Published: 2024-10-28T00:15:03.370
Modified: 2024-10-30T18:31:49.533
Link: CVE-2024-10433
No data.