提交 #42899: Simple Food Ordering System Cross Site Scripting信息

标题Simple Food Ordering System Cross Site Scripting
描述Simple Food Ordering System in /login.php "email、password" Parameters have Cross Site Scripting(XSS). Date: 2022-08/05 Exploit Author: [email protected] Vendor Homepage: https://www.sourcecodester.com Software Link: https://www.sourcecodester.com/php/15418/simple-food-ordering-system-client-side-phpmysqli-free-source-code.html Version: 1.0 /login.php "email、password"Parameters have Cross Site Scripting(XSS) POC "><ScRiPt>alert(1)</sCrIpT>
来源⚠️ https://github.com/anx0ing/CVE_demo/blob/main/2022/Simple%20Food%20Ordering%20System-XSS.md
用户
 anx0ing (UID 30698)
提交2022-08-05 17時40分 (4 年前)
管理2022-08-05 20時59分 (3 hours later)
状态已接受
VulDB条目205671 [SourceCodester Simple Food Ordering System 1.0 /login.php email/password 跨网站脚本]
积分20

Do you know our Splunk app?

Download it now for free!