First published: Thu May 16 2024(Updated: )
A vulnerability, which was classified as problematic, was found in code-projects Simple Chat System 1.0. Affected is an unknown function of the file /register.php. The manipulation of the argument name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264540.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Simple Chat System | =1.0 | |
Simple Chat System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4974 is classified as a problematic vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2024-4974, ensure proper input validation and sanitization on the name parameter in the /register.php file.
CVE-2024-4974 is a cross-site scripting (XSS) vulnerability allowing remote code execution via manipulated input.
CVE-2024-4974 affects Simple Chat System version 1.0.
Yes, CVE-2024-4974 can be exploited remotely by sending malicious requests to the affected system.