Submeter #49603: Sanitization Management System v1.0 Stored Cross Site Scriptinginformação

TítuloSanitization Management System v1.0 Stored Cross Site Scripting
DescriçãoIn Sanitization Management System v1.0, several parameters do not have sufficient input sanitization mechanisms which led to successful execution of cross-site scripting payloads. Affected parameters: 1. name (Endpoint: /php-sms/classes/SystemSettings.php) 2. shortname (Endpoint: /php-sms/classes/SystemSettings.php) 3. message (Endpoint: /php-sms/classes/Master.php) Affected Sink: 1. Entire application for /php-sms/classes/SystemSettings.php 2. /php-sms/admin/?page=inquiries/view_inquiry for /php-sms/classes/Master.php References: https://www.sourcecodester.com/php/15770/sanitization-management-system-project-php-and-mysql-free-source-code.html
Utilizador
 jiajian (UID 34329)
Submissão23/10/2022 18h59 (há 3 anos)
Moderação24/10/2022 07h40 (13 hours later)
EstadoAceite
Entrada VulDB212015 [SourceCodester Sanitization Management System 1.0 SystemSettings.php name/shortname Script de Site Cruzado]
Pontos17

Interested in the pricing of exploits?

See the underground prices here!