{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-10414","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-10-26T13:34:55.869Z","datePublished":"2024-10-27T10:31:05.206Z","dateUpdated":"2024-10-28T19:20:03.771Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-10-27T10:31:05.206Z"},"title":"PHPGurukul Vehicle Record System edit-brand.php cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"Cross Site Scripting"}]}],"affected":[{"vendor":"PHPGurukul","product":"Vehicle Record System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, was found in PHPGurukul Vehicle Record System 1.0. This affects an unknown part of the file /admin/edit-brand.php. The manipulation of the argument Brand Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions the parameter \"phone_number\" to be affected. But this might be a mistake because the textbox field label is \"Brand Name\"."},{"lang":"de","value":"Es wurde eine problematische Schwachstelle in PHPGurukul Vehicle Record System 1.0 gefunden. Es betrifft eine unbekannte Funktion der Datei /admin/edit-brand.php. Durch die Manipulation des Arguments Brand Name mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":2.4,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":2.4,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":3.3,"vectorString":"AV:N/AC:L/Au:M/C:N/I:P/A:N"}}],"timeline":[{"time":"2024-10-26T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-10-26T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-10-26T15:39:59.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"jadu101 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.281955","name":"VDB-281955 | PHPGurukul Vehicle Record System edit-brand.php cross site scripting","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.281955","name":"VDB-281955 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.431623","name":"Submit #431623 | PHPGurukul Vehicle Record System 1.0 Cross Site Scripting","tags":["third-party-advisory"]},{"url":"https://github.com/jadu101/CVE/blob/main/phpgurukul_vehicle_record_system_edit_brand_xss.md","tags":["exploit"]},{"url":"https://phpgurukul.com/","tags":["product"]}]},"adp":[{"affected":[{"vendor":"phpgurukul","product":"vehicle_record_system","cpes":["cpe:2.3:a:phpgurukul:vehicle_record_system:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.0","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-28T17:15:05.974943Z","id":"CVE-2024-10414","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-28T19:20:03.771Z"}}]}}