CVE-2022-2213

A vulnerability was found in SourceCodester Library Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/edit_admin_details.php?id=admin. The manipulation of the argument Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Configurations

Configuration 1 (hide)

cpe:2.3:a:library_management_system_project:library_management_system:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:00

Type Values Removed Values Added
References () https://github.com/CyberThoth/CVE/blob/main/CVE/Library%20Management%20System%20with%20QR%20code%20Attendance/Cross%20Site%20Scripting%28Stored%29/POC.md - () https://github.com/CyberThoth/CVE/blob/main/CVE/Library%20Management%20System%20with%20QR%20code%20Attendance/Cross%20Site%20Scripting%28Stored%29/POC.md -
References () https://vuldb.com/?id.202759 - Third Party Advisory () https://vuldb.com/?id.202759 - Third Party Advisory
CVSS v2 : 3.5
v3 : 5.4
v2 : 3.5
v3 : 3.5

07 Nov 2023, 03:46

Type Values Removed Values Added
References
  • {'url': 'https://github.com/CyberThoth/CVE/blob/main/CVE/Library%20Management%20System%20with%20QR%20code%20Attendance/Cross%20Site%20Scripting(Stored)/POC.md', 'name': 'https://github.com/CyberThoth/CVE/blob/main/CVE/Library%20Management%20System%20with%20QR%20code%20Attendance/Cross%20Site%20Scripting(Stored)/POC.md', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://github.com/CyberThoth/CVE/blob/main/CVE/Library%20Management%20System%20with%20QR%20code%20Attendance/Cross%20Site%20Scripting%28Stored%29/POC.md -

Information

Published : 2022-06-27 07:15

Updated : 2024-11-21 07:00


NVD link : CVE-2022-2213

Mitre link : CVE-2022-2213

CVE.ORG link : CVE-2022-2213


JSON object : View

Products Affected

library_management_system_project

  • library_management_system
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')