A vulnerability, which was classified as problematic, was found in code-projects Chat System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://code-projects.org/ | Product |
https://vuldb.com/?ctiid.289767 | Permissions Required |
https://vuldb.com/?id.289767 | Third Party Advisory |
https://vuldb.com/?submit.471111 | Third Party Advisory |
Configurations
History
06 Jan 2025, 18:11
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:code-projects:chat_system:1.0:*:*:*:*:*:*:* | |
First Time |
Code-projects chat System
Code-projects |
|
References | () https://code-projects.org/ - Product | |
References | () https://vuldb.com/?ctiid.289767 - Permissions Required | |
References | () https://vuldb.com/?id.289767 - Third Party Advisory | |
References | () https://vuldb.com/?submit.471111 - Third Party Advisory | |
Summary |
|
30 Dec 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-30 02:15
Updated : 2025-01-06 18:11
NVD link : CVE-2024-13034
Mitre link : CVE-2024-13034
CVE.ORG link : CVE-2024-13034
JSON object : View
Products Affected
code-projects
- chat_system