| Titre | Simple Food Ordering System Cross Site Scripting |
|---|
| Description | Simple Food Ordering System in /login.php "email、password" Parameters have Cross Site Scripting(XSS).
Date:
2022-08/05
Exploit Author:
[email protected]
Vendor Homepage:
https://www.sourcecodester.com
Software Link:
https://www.sourcecodester.com/php/15418/simple-food-ordering-system-client-side-phpmysqli-free-source-code.html
Version:
1.0
/login.php
"email、password"Parameters have Cross Site Scripting(XSS)
POC
"><ScRiPt>alert(1)</sCrIpT> |
|---|
| La source | ⚠️ https://github.com/anx0ing/CVE_demo/blob/main/2022/Simple%20Food%20Ordering%20System-XSS.md |
|---|
| Utilisateur | anx0ing (UID 30698) |
|---|
| Soumission | 05/08/2022 17:40 (il y a 4 ans) |
|---|
| Modérer | 05/08/2022 20:59 (3 hours later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 205671 [SourceCodester Simple Food Ordering System 1.0 /login.php email/password cross site scripting] |
|---|
| Points | 20 |
|---|