2 results (0.012 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in Project Worlds Simple Web-Based Chat Application 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument Name/Comment leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/jadu101/CVE/blob/main/project_worlds_simple_web_based_chat_app_index_xss.md https://vuldb.com/?ctiid.281984 https://vuldb.com/?id.281984 https://vuldb.com/?submit.432236 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability has been found in Project Worlds Simple Web-Based Chat Application 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/jadu101/CVE/blob/main/project_worlds_simple_web_based_chat_app_index_sqli.md https://vuldb.com/?ctiid.281983 https://vuldb.com/?id.281983 https://vuldb.com/?submit.432234 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •