{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-0958","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-01-26T17:11:19.954Z","datePublished":"2024-01-27T06:00:05.543Z","dateUpdated":"2024-10-18T14:39:40.386Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-01-27T06:00:05.543Z"},"title":"CodeAstro Stock Management System Add Category index.php cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"CodeAstro","product":"Stock Management System","versions":[{"version":"1.0","status":"affected"}],"modules":["Add Category Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in CodeAstro Stock Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /index.php of the component Add Category Handler. The manipulation of the argument Category Name/Category Description leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252203."},{"lang":"de","value":"Eine problematische Schwachstelle wurde in CodeAstro Stock Management System 1.0 gefunden. Betroffen davon ist ein unbekannter Prozess der Datei /index.php der Komponente Add Category Handler. Mittels Manipulieren des Arguments Category Name/Category Description mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2024-01-26T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-01-26T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-01-26T18:16:24.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Mohammed Aashique (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.252203","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.252203","tags":["signature","permissions-required"]},{"url":"https://drive.google.com/drive/folders/17JTwjuT09q7he_oXkMtZS5jyyXw8ZIgg?usp=sharing","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:26:30.420Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.252203","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.252203","tags":["signature","permissions-required","x_transferred"]},{"url":"https://drive.google.com/drive/folders/17JTwjuT09q7he_oXkMtZS5jyyXw8ZIgg?usp=sharing","tags":["exploit","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-18T14:39:07.991211Z","id":"CVE-2024-0958","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-18T14:39:40.386Z"}}]}}