إرسال #42809: Student-Admission-Reflection Xssالمعلومات

عنوانStudent-Admission-Reflection Xss
الوصفPayload:index.php?a=edit&eid=8</h3><script>alert(1)</script> Without checking the EID parameter, PHP print is directly used to output it, causing reflective XSS vulnerability and allowing attackers to obtain Cookie values. Code ``` <div class="form-area"> <div class="container"> <div class="row"> <div class="col-md-12"> <div class="section-title"> <h3 id="et">Edit the ID: <?php print $_GET['eid'].', Name: '.$row["sname"]; ?>'s information</h3> ``` url:https://github.com/badboycxcc/Student-Admission-Xss
المصدر⚠️ https://github.com/badboycxcc/Student-Admission-Xss
المستخدم
 cxaqhq (UID 23728)
ارسال04/08/2022 07:58 AM (4 سنوات منذ)
الاعتدال04/08/2022 08:05 AM (7 minutes later)
الحالةتمت الموافقة
إدخال VulDB205572 [SourceCodester Online Admission System index.php eid البرمجة عبر المواقع]
النقاط20

Want to know what is going to be exploited?

We predict KEV entries!