First published: Sat Jul 08 2023(Updated: )
A vulnerability classified as problematic was found in GZ Scripts PHP GZ Appointment Scheduling Script 1.8. Affected by this vulnerability is an unknown functionality of the file /load.php. The manipulation of the argument first_name/second_name/phone/address_1/country leads to cross site scripting. The attack can be launched remotely. The identifier VDB-233353 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gzscripts Php Gz Appointment Scheduling Script | =1.8 | |
=1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-3559 is medium with a severity value of 6.1.
The affected software of CVE-2023-3559 is GZ Scripts PHP GZ Appointment Scheduling Script version 1.8.
The vulnerability type of CVE-2023-3559 is cross-site scripting (XSS).
To fix CVE-2023-3559, it is recommended to update to a secure version of GZ Scripts PHP GZ Appointment Scheduling Script and sanitize user input to prevent cross-site scripting attacks.
You can find more information about CVE-2023-3559 in the CVE details database at the following links: [CVE-2023-3559 on VulDB](https://vuldb.com/?ctiid.233353) and [CVE-2023-3559 on VulDB](https://vuldb.com/?id.233353).