cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-8151,https://securityvulnerability.io/vulnerability/CVE-2024-8151,Cross Site Scripting Vulnerability Discovered in SourceCodester Interactive Map,"A vulnerability exists in SourceCodester's Interactive Map with Marker version 1.0, specifically in the delete-mark.php file. This security issue arises from improper handling of user input within the application. By manipulating the 'mark' argument, it is possible for attackers to execute cross site scripting (XSS) attacks remotely. The exploit has been publicly disclosed, raising concerns for users of this application who may be at risk of unauthorized data exposure or malicious actions executed within the user's browser.",Sourcecodester,Interactive Map With Marker,5.4,MEDIUM,0.0008399999933317304,false,,false,false,true,2024-08-25T21:00:06.000Z,true,false,false,,2024-08-25T22:00:06.910Z,0 CVE-2024-4968,https://securityvulnerability.io/vulnerability/CVE-2024-4968,Marker Name Vulnerability: Remote Cross-Site Scripting Attack,A vulnerability was found in SourceCodester Interactive Map with Marker 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file Marker Name of the component Add Marker. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264536.,Sourcecodester,Interactive Map With Marker,6.1,MEDIUM,0.00044999999227002263,false,,false,false,true,2024-05-16T07:31:05.000Z,true,false,false,,2024-05-16T08:31:05.608Z,0 CVE-2024-4967,https://securityvulnerability.io/vulnerability/CVE-2024-4967,SQL Injection Vulnerability in SourceCodester Interactive Map Application,"A critical SQL Injection vulnerability has been identified in the SourceCodester Interactive Map with Marker version 1.0. This vulnerability arises from an insecure handling of user-supplied input in the /endpoint/delete-mark.php file. By manipulating the 'mark' parameter, an attacker can execute arbitrary SQL queries against the database, potentially compromising sensitive data. This vulnerability can be exploited remotely, increasing the risk of unauthorized access and data breaches. Organizations using this application should evaluate their exposure and apply necessary patches or workarounds to mitigate this security risk. The potential for public exploitation highlights the urgency for immediate review and action.",Sourcecodester,Interactive Map With Marker,9.8,CRITICAL,0.00044999999227002263,false,,false,false,true,2024-05-16T07:31:04.000Z,true,false,false,,2024-05-16T08:31:04.218Z,0