| Titel | Online Job Portal https://www.sourcecodester.com/php/14518/online-job-portal-php-full-source-code-2020.html 1.0 stored XSS Bypass in the Job Title Field |
|---|
| Beschreibung | Dear Ladies and Gentlemen,
I hope this message finds you well.
I would like to express my gratitude for your valuable time and attention.
My brother and I have successfully identified a medium-level vulnerability, specifically a stored XSS Bypass, within your Job Portal Application.
Proof of Concept Links:
https://prnt.sc/1W0g0F8vv2mw
https://prnt.sc/FgJ1bgiU5Cx3
Consequently, I am writing this email to provide you with a comprehensive Proof of Concept, including a video demonstration and relevant screenshots.
Furthermore, I would like to kindly request your consideration in assigning a CVE identifier to this discovery. I have attached a previous example for the same application for your reference.
Link for the previous CVE https://vuldb.com/?id.249182
Thank you once again for your time, and I look forward to your response.
Sincerely,
Ahmed Hassan |
|---|
| Quelle | ⚠️ https://prnt.sc/FgJ1bgiU5Cx3 |
|---|
| Benutzer | ahmed8199 (UID 60803) |
|---|
| Einreichung | 25.02.2024 02:03 (vor 2 Jahren) |
|---|
| Moderieren | 27.02.2024 08:24 (2 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 254854 [SourceCodester Online Job Portal 1.0 Manage Walkin Page ManageWalkin.php Job Title Cross Site Scripting] |
|---|
| Punkte | 17 |
|---|