Description
A vulnerability has been found in SourceCodester Best Courier Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file parcel_list.php of the component GET Parameter Handler. The manipulation of the argument id with the input </TiTlE><ScRiPt>alert(1)</ScRiPt> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246127.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-58543 | A vulnerability has been found in SourceCodester Best Courier Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file parcel_list.php of the component GET Parameter Handler. The manipulation of the argument id with the input </TiTlE><ScRiPt>alert(1)</ScRiPt> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246127. |
References
History
No history.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-02T08:28:21.497Z
Reserved: 2023-11-26T07:33:10.402Z
Link: CVE-2023-6301
No data.
Status : Modified
Published: 2023-11-27T00:15:07.597
Modified: 2024-11-21T08:43:34.177
Link: CVE-2023-6301
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD