{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-0258","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-01-12T21:19:16.961Z","datePublished":"2023-01-12T21:20:59.100Z","dateUpdated":"2024-08-02T05:02:44.033Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T18:15:22.676Z"},"title":"SourceCodester Online Food Ordering System Category List cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"SourceCodester","product":"Online Food Ordering System","versions":[{"version":"2.0","status":"affected"}],"modules":["Category List Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in SourceCodester Online Food Ordering System 2.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Category List Handler. The manipulation of the argument Reason with the input \"><script>prompt(1)</script> leads to cross site scripting. The attack may be launched remotely. VDB-218186 is the identifier assigned to this vulnerability."},{"lang":"de","value":"Eine problematische Schwachstelle wurde in SourceCodester Online Food Ordering System 2.0 ausgemacht. Es geht hierbei um eine nicht näher spezifizierte Funktion der Komponente Category List Handler. Dank Manipulation des Arguments Reason mit der Eingabe \"><script>prompt(1)</script> mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":2.4,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":2.4,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":3.3,"vectorString":"AV:N/AC:L/Au:M/C:N/I:P/A:N"}}],"timeline":[{"time":"2023-01-12T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-01-12T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-01-12T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-02-05T10:27:03.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"lucifoxer001 (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.218186","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.218186","tags":["signature"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:02:44.033Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.218186","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.218186","tags":["signature","x_transferred"]}]}]}}