A vulnerability was found in SourceCodester Food Ordering Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument description leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/Niu-zida/cve/blob/main/Cross-Site%20Scripting.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.276818 | Permissions Required |
https://vuldb.com/?id.276818 | Permissions Required Third Party Advisory |
https://vuldb.com/?submit.404604 | Third Party Advisory VDB Entry |
https://www.sourcecodester.com/ | Product |
Configurations
History
10 Sep 2024, 15:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:oretnom23:food_ordering_management_system:1.0:*:*:*:*:*:*:* | |
References | () https://github.com/Niu-zida/cve/blob/main/Cross-Site%20Scripting.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.276818 - Permissions Required | |
References | () https://vuldb.com/?id.276818 - Permissions Required, Third Party Advisory | |
References | () https://vuldb.com/?submit.404604 - Third Party Advisory, VDB Entry | |
References | () https://www.sourcecodester.com/ - Product | |
First Time |
Oretnom23
Oretnom23 food Ordering Management System |
|
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 6.1 |
09 Sep 2024, 13:03
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
08 Sep 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-08 22:15
Updated : 2024-09-10 15:48
NVD link : CVE-2024-8582
Mitre link : CVE-2024-8582
CVE.ORG link : CVE-2024-8582
JSON object : View
Products Affected
oretnom23
- food_ordering_management_system
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')