A vulnerability has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file register.php. The manipulation of the argument txtfullname/txtage/txtaddress/txtphone leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222853 was assigned to this vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-23612 A vulnerability has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file register.php. The manipulation of the argument txtfullname/txtage/txtaddress/txtphone leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222853 was assigned to this vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2024-08-02T05:41:00.223Z

Reserved: 2023-03-11T17:40:04.036Z

Link: CVE-2023-1354

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-03-11T18:15:43.817

Modified: 2024-11-21T07:39:00.893

Link: CVE-2023-1354

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses