A vulnerability was found in SourceCodester Vehicle Service Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /inc/topBarNav.php. The manipulation of the argument search leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-226106 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/E1CHO/cve_hub/blob/main/Vehicle%20Service%20Management%20System/Vehicle%20Service%20Management%20System%20-%20vuln%207.pdf | Exploit |
https://vuldb.com/?ctiid.226106 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.226106 | Third Party Advisory |
https://github.com/E1CHO/cve_hub/blob/main/Vehicle%20Service%20Management%20System/Vehicle%20Service%20Management%20System%20-%20vuln%207.pdf | Exploit |
https://vuldb.com/?ctiid.226106 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.226106 | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/E1CHO/cve_hub/blob/main/Vehicle%20Service%20Management%20System/Vehicle%20Service%20Management%20System%20-%20vuln%207.pdf - Exploit | |
References | () https://vuldb.com/?ctiid.226106 - Permissions Required, Third Party Advisory | |
References | () https://vuldb.com/?id.226106 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 3.5 |
18 Oct 2023, 15:58
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:oretnom23:vehicle_service_management_system:1.0:*:*:*:*:*:*:* | |
First Time |
Oretnom23
Oretnom23 vehicle Service Management System |
Information
Published : 2023-04-15 12:15
Updated : 2024-11-21 07:57
NVD link : CVE-2023-2098
Mitre link : CVE-2023-2098
CVE.ORG link : CVE-2023-2098
JSON object : View
Products Affected
oretnom23
- vehicle_service_management_system
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')