mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
96 lines
3.4 KiB
JSON
96 lines
3.4 KiB
JSON
{
|
|
"id": "CVE-2024-3090",
|
|
"sourceIdentifier": "cna@vuldb.com",
|
|
"published": "2024-03-30T13:15:45.663",
|
|
"lastModified": "2024-05-17T02:39:43.047",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A vulnerability was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/add-ambulance.php of the component Add Ambulance Page. The manipulation of the argument Ambulance Reg No/Driver Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258683."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad fue encontrada en PHPGurukul Emergency Ambulance Hiring Portal 1.0 y clasificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo /admin/add-ambulance.php del componente Agregar p\u00e1gina de ambulancia. La manipulaci\u00f3n del argumento N\u00famero de registro de ambulancia/Nombre del conductor conduce a cross-site scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-258683."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "cna@vuldb.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 2.4,
|
|
"baseSeverity": "LOW"
|
|
},
|
|
"exploitabilityScore": 0.9,
|
|
"impactScore": 1.4
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "cna@vuldb.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "MULTIPLE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 3.3
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 6.4,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "cna@vuldb.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_authsxss.md",
|
|
"source": "cna@vuldb.com"
|
|
},
|
|
{
|
|
"url": "https://vuldb.com/?ctiid.258683",
|
|
"source": "cna@vuldb.com"
|
|
},
|
|
{
|
|
"url": "https://vuldb.com/?id.258683",
|
|
"source": "cna@vuldb.com"
|
|
},
|
|
{
|
|
"url": "https://vuldb.com/?submit.306964",
|
|
"source": "cna@vuldb.com"
|
|
}
|
|
]
|
|
} |