| Título | Online Job Portal https://www.sourcecodester.com/php/14518/online-job-portal-php-full-source-code-2020.html 1.0 stored XSS Bypass in the Job Title Field |
|---|
| Descripción | Dear Ladies and Gentlemen,
I hope this message finds you well.
I would like to express my gratitude for your valuable time and attention.
My brother and I have successfully identified a medium-level vulnerability, specifically a stored XSS Bypass, within your Job Portal Application.
Proof of Concept Links:
https://prnt.sc/1W0g0F8vv2mw
https://prnt.sc/FgJ1bgiU5Cx3
Consequently, I am writing this email to provide you with a comprehensive Proof of Concept, including a video demonstration and relevant screenshots.
Furthermore, I would like to kindly request your consideration in assigning a CVE identifier to this discovery. I have attached a previous example for the same application for your reference.
Link for the previous CVE https://vuldb.com/?id.249182
Thank you once again for your time, and I look forward to your response.
Sincerely,
Ahmed Hassan |
|---|
| Fuente | ⚠️ https://prnt.sc/FgJ1bgiU5Cx3 |
|---|
| Usuario | ahmed8199 (UID 60803) |
|---|
| Sumisión | 2024-02-25 02:03 (hace 2 años) |
|---|
| Moderación | 2024-02-27 08:24 (2 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 254854 [SourceCodester Online Job Portal 1.0 Manage Walkin Page ManageWalkin.php Job Title secuencias de comandos en sitios cruzados] |
|---|
| Puntos | 17 |
|---|