| Título | Simple Food Ordering System Cross Site Scripting |
|---|
| Descripción | Simple Food Ordering System in /login.php "email、password" Parameters have Cross Site Scripting(XSS).
Date:
2022-08/05
Exploit Author:
[email protected]
Vendor Homepage:
https://www.sourcecodester.com
Software Link:
https://www.sourcecodester.com/php/15418/simple-food-ordering-system-client-side-phpmysqli-free-source-code.html
Version:
1.0
/login.php
"email、password"Parameters have Cross Site Scripting(XSS)
POC
"><ScRiPt>alert(1)</sCrIpT> |
|---|
| Fuente | ⚠️ https://github.com/anx0ing/CVE_demo/blob/main/2022/Simple%20Food%20Ordering%20System-XSS.md |
|---|
| Usuario | anx0ing (UID 30698) |
|---|
| Sumisión | 2022-08-05 17:40 (hace 4 años) |
|---|
| Moderación | 2022-08-05 20:59 (3 hours later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 205671 [SourceCodester Simple Food Ordering System 1.0 /login.php email/password secuencias de comandos en sitios cruzados] |
|---|
| Puntos | 20 |
|---|