Vulnerability Description
A vulnerability, which was classified as problematic, was found in SourceCodester Bank Management System 1.0. This affects the file /mnotice.php?id=2. The manipulation of the argument notice with the input <script>alert(1)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bank Management System Project | Bank Management System | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/joinia/webray.com.cn/blob/main/php-bank/phpbankxss.mdExploitThird Party Advisory
- https://vuldb.com/?id.202035Permissions RequiredThird Party Advisory
- https://github.com/joinia/webray.com.cn/blob/main/php-bank/phpbankxss.mdExploitThird Party Advisory
- https://vuldb.com/?id.202035Permissions RequiredThird Party Advisory
FAQ
What is CVE-2022-2087?
CVE-2022-2087 is a vulnerability with a CVSS score of 3.5 (LOW). A vulnerability, which was classified as problematic, was found in SourceCodester Bank Management System 1.0. This affects the file /mnotice.php?id=2. The manipulation of the argument notice with the ...
How severe is CVE-2022-2087?
CVE-2022-2087 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-2087?
Check the references section above for vendor advisories and patch information. Affected products include: Bank Management System Project Bank Management System.