Soumettre #747921: Patrick Mvuma Patients Waiting Area Queue Management System 1.0 Doubled Character XSS Manipulationsinformation

TitrePatrick Mvuma Patients Waiting Area Queue Management System 1.0 Doubled Character XSS Manipulations
DescriptionPatients Waiting Area Queue Management System checkin - XSS Date: 2026-01/28 Exploit Author: [email protected] Vendor Homepage: https://www.sourcecodester.com Software Link: https://www.sourcecodester.com/php/18348/patients-waiting-area-queue-management-system.html Tested on: MacOs13.5 + phpstudy Poc: https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Patients-Waiting-Area-Queue-Management-System-checkin-php-XSS.md
La source⚠️ https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Patients-Waiting-Area-Queue-Management-System-checkin-php-XSS.md
Utilisateur
 webray.com.cn (UID 24778)
Soumission28/01/2026 04:46 (il y a 3 mois)
Modérer07/02/2026 08:54 (10 days later)
StatutAccepté
Entrée VulDB344852 [SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0 /checkin.php patient_id cross site scripting]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!