提出 #747920: Patrick Mvuma Patients Waiting Area Queue Management System 1.0 Doubled Character XSS Manipulations情報

タイトルPatrick Mvuma Patients Waiting Area Queue Management System 1.0 Doubled Character XSS Manipulations
説明Patients Waiting Area Queue Management System appointments- XSS Date: 2026-01/28 Exploit Author: [email protected] Vendor Homepage: https://www.sourcecodester.com Software Link: https://www.sourcecodester.com/php/18348/patients-waiting-area-queue-management-system.html Tested on: MacOs13.5 + phpstudy Poc: https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Patients-Waiting-Area-Queue-Management-System-appointments-XSS.md
ソース⚠️ https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Patients-Waiting-Area-Queue-Management-System-appointments-XSS.md
ユーザー
 webray.com.cn (UID 24778)
送信2026年01月28日 04:44 (3 月 ago)
モデレーション2026年02月07日 08:54 (10 days later)
ステータス承諾済み
VulDBエントリ344851 [SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0 /appointments.php patient_id クロスサイトスクリプティング]
ポイント20

Want to know what is going to be exploited?

We predict KEV entries!