CVE-2018-12650
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to inject malicious scripts into the Adrenalin HRMS software, which can then be executed in the browsers of users who visit the affected page. To exploit this, the attacker needs to trick users into clicking a specially crafted link that includes the harmful script.
Technical Description
Adrenalin HRMS version 5.4.0 contains a Reflected Cross Site Scripting (XSS) vulnerability in the ApplicationtEmployeeSearch page via 'prntDDLCntrlName' and 'prntFrmName'.
CVSS Vector Analysis
Vector String
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Oct 24, 2018
over 7 years ago
Last Modified
Mar 2, 2026
about 1 month ago
Vendor
myadrenalin
Product
human resource management software
Related Vulnerabilities
An attacker can inject harmful JavaScript code into the Adrenalin HRMS system, which can then be executed in the browsers of users who view the affected report. This vulnerability requires the attacker to manipulate the 'ReportId' parameter on a specific page, allowing them to target users without needing to authenticate.
This vulnerability allows an attacker to inject malicious JavaScript into the Adrenalin HRMS software, which can then be executed in the browsers of users who visit a specially crafted link. To exploit this, the attacker needs to trick users into clicking on a link that includes their malicious code in the parameters of the request.
This vulnerability allows an attacker to inject malicious JavaScript code into the HR management software, which can then be executed in the browsers of users who view the affected page. It requires the attacker to trick a user into clicking a specially crafted link that includes the harmful code in the search parameters.
This vulnerability allows an attacker to inject malicious JavaScript into a webpage, which can then execute in the browser of anyone who visits that page. To exploit this, the attacker needs to trick a user into clicking a link that includes their harmful code in the request to the affected HRMS software.