First published: Sun Mar 19 2023(Updated: )
A vulnerability, which was classified as problematic, has been found in code-projects Simple Art Gallery 1.0. Affected by this issue is some unknown functionality of the file adminHome.php. The manipulation of the argument about_info leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223400.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Simple Art Gallery Project Simple Art Gallery | =1.0 | |
code-projects Simple Art Gallery | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-1500 is medium (6.1).
The affected software of CVE-2023-1500 is Simple Art Gallery 1.0.
The CWE category of CVE-2023-1500 is CWE-79 (Cross-Site Scripting).
CVE-2023-1500 can be exploited by manipulating the 'about_info' argument in the 'adminHome.php' file, which leads to cross-site scripting.
Yes, here are some references for CVE-2023-1500: - [Link 1](https://vuldb.com/?id.223400) - [Link 2](https://vuldb.com/?ctiid.223400) - [Link 3](https://github.com/Decemberus/BugHub/blob/main/SIMPLE%20ART%20GALLERY%20system%20has%20%20Cross%20site%20scripting%20vulnerabilities.pdf)