| Titel | Patrick Mvuma Patients Waiting Area Queue Management System 1.0 Doubled Character XSS Manipulations |
|---|
| Beschreibung | Patients Waiting Area Queue Management System checkin - XSS
Date: 2026-01/28
Exploit Author: [email protected]
Vendor Homepage: https://www.sourcecodester.com
Software Link: https://www.sourcecodester.com/php/18348/patients-waiting-area-queue-management-system.html
Tested on: MacOs13.5 + phpstudy
Poc: https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Patients-Waiting-Area-Queue-Management-System-checkin-php-XSS.md |
|---|
| Quelle | ⚠️ https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Patients-Waiting-Area-Queue-Management-System-checkin-php-XSS.md |
|---|
| Benutzer | webray.com.cn (UID 24778) |
|---|
| Einreichung | 28.01.2026 04:46 (vor 3 Monaten) |
|---|
| Moderieren | 07.02.2026 08:54 (10 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 344852 [SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0 /checkin.php patient_id Cross Site Scripting] |
|---|
| Punkte | 20 |
|---|