{"containers":{"cna":{"affected":[{"product":"Garage Management System","vendor":"SourceCodester","versions":[{"status":"affected","version":"n/a"}]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in SourceCodester Garage Management System and classified as problematic. Affected by this vulnerability is an unknown functionality of the file edituser.php. The manipulation of the argument id with the input 1\\\"><ScRiPt>alert(1)</sCrIpT> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-205573 was assigned to this vulnerability."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":3.5,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Cross Site Scripting","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-08-04T08:40:44.000Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"tags":["x_refsource_MISC"],"url":"https://vuldb.com/?id.205573"}],"title":"SourceCodester Garage Management System edituser.php cross site scripting","x_generator":"vuldb.com","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cna@vuldb.com","ID":"CVE-2022-2645","REQUESTER":"cna@vuldb.com","STATE":"PUBLIC","TITLE":"SourceCodester Garage Management System edituser.php cross site scripting"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Garage Management System","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"SourceCodester"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability has been found in SourceCodester Garage Management System and classified as problematic. Affected by this vulnerability is an unknown functionality of the file edituser.php. The manipulation of the argument id with the input 1\\\"><ScRiPt>alert(1)</sCrIpT> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-205573 was assigned to this vulnerability."}]},"generator":"vuldb.com","impact":{"cvss":{"baseScore":"3.5","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross Site Scripting"}]}]},"references":{"reference_data":[{"name":"https://vuldb.com/?id.205573","refsource":"MISC","url":"https://vuldb.com/?id.205573"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T00:46:03.342Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://vuldb.com/?id.205573"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T17:12:18.722338Z","id":"CVE-2022-2645","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T14:01:27.431Z"}}]},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2022-2645","datePublished":"2022-08-04T08:40:44.000Z","dateReserved":"2022-08-04T00:00:00.000Z","dateUpdated":"2025-04-15T14:01:27.431Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}