diff --git a/advisories/unreviewed/2024/03/GHSA-c7qj-xcvw-r7jv/GHSA-c7qj-xcvw-r7jv.json b/advisories/unreviewed/2024/03/GHSA-c7qj-xcvw-r7jv/GHSA-c7qj-xcvw-r7jv.json index 0328938f9f89f..1a2348db2268c 100644 --- a/advisories/unreviewed/2024/03/GHSA-c7qj-xcvw-r7jv/GHSA-c7qj-xcvw-r7jv.json +++ b/advisories/unreviewed/2024/03/GHSA-c7qj-xcvw-r7jv/GHSA-c7qj-xcvw-r7jv.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-c7qj-xcvw-r7jv", - "modified": "2024-08-01T15:31:30Z", + "modified": "2025-03-24T18:31:45Z", "published": "2024-03-02T00:31:31Z", "aliases": [ "CVE-2024-27743" ], + "summary": "CVE-2024-27743", "details": "Cross Site Scripting vulnerability in Petrol Pump Mangement Software v.1.0 allows an attacker to execute arbitrary code via a crafted payload to the Address parameter in the add_invoices.php component.", "severity": [ { @@ -13,7 +14,24 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -26,10 +44,6 @@ { "type": "WEB", "url": "https://www.sourcecodester.com/php/17180/petrol-pump-management-software-free-download.html" - }, - { - "type": "WEB", - "url": "http://mayurik.com" } ], "database_specific": {