إرسال #747921: Patrick Mvuma Patients Waiting Area Queue Management System 1.0 Doubled Character XSS Manipulationsالمعلومات

عنوانPatrick Mvuma Patients Waiting Area Queue Management System 1.0 Doubled Character XSS Manipulations
الوصفPatients Waiting Area Queue Management System checkin - XSS Date: 2026-01/28 Exploit Author: [email protected] Vendor Homepage: https://www.sourcecodester.com Software Link: https://www.sourcecodester.com/php/18348/patients-waiting-area-queue-management-system.html Tested on: MacOs13.5 + phpstudy Poc: https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Patients-Waiting-Area-Queue-Management-System-checkin-php-XSS.md
المصدر⚠️ https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Patients-Waiting-Area-Queue-Management-System-checkin-php-XSS.md
المستخدم
 webray.com.cn (UID 24778)
ارسال28/01/2026 04:46 AM (3 أشهر منذ)
الاعتدال07/02/2026 08:54 AM (10 days later)
الحالةتمت الموافقة
إدخال VulDB344852 [SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0 /checkin.php patient_id البرمجة عبر المواقع]
النقاط20

Do you want to use VulDB in your project?

Use the official API to access entries easily!