| Titre | CodeAstro Simple-Hospital-Management-System-in-Python 1.0 Cross Site Scripting |
|---|
| Description | A critical Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Available Doctor's file of CodeAstro Simple Hospital Management System in Python. Attackers can inject malicious JavaScript via the patname field (POST parameter), which gets persistently stored in the database and executed whenever the page is viewed. |
|---|
| La source | ⚠️ https://github.com/Vanshdhawan188/Simple-Hospital-Management-System-in-Python-CodeAstro-Patients-Stored-XSS-Doctors-Page/blob/main/Simple-Hospital-Management-System-in-Python-CodeAstro-Patients-Stored-XSS-Doctors%20Page.md |
|---|
| Utilisateur | Subhash Paudel (UID 66830) |
|---|
| Soumission | 29/06/2025 09:34 (il y a 10 mois) |
|---|
| Modérer | 07/07/2025 07:56 (8 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 315091 [CodeAstro Simple Hospital Management System 1.0 POST Parameter /doctor.html First Name/Last name/Address cross site scripting] |
|---|
| Points | 18 |
|---|