Title | Engineers Online Portal Web 1.0 stored XSS Bypass by adding a new Engineer |
---|
Description | Dear Ladies and Gentlemen,
I hope this message finds you well.
I would like to express my gratitude for your valuable time and attention.
My brother and I have successfully identified a medium-level vulnerability, specifically a stored XSS Bypass by adding a new Engineer, within your Engineers Online Portal Application.
Consequently, I am writing this email to provide you with a comprehensive Proof of Concept, including a video demonstration and relevant screenshots.
Furthermore, I would like to kindly request your consideration in assigning a CVE identifier to this discovery. I have attached a previous example for the same application for your reference.
Link for the previous CVE https://vuldb.com/?id.249182
Thank you once again for your time, and I look forward to your response.
Sincerely,
Ahmed Hassan |
---|
Source | ⚠️ https://mega.nz/file/eN8yEKSA#YCJNH1v4BKOG2xyxOZYPIuO3Oz7biv2ugfarAI5n_3k |
---|
User | ahmed8199 (UID 60803) |
---|
Submission | 01/01/2024 12:53 (il y a 1 Année) |
---|
Moderation | 01/01/2024 16:37 (4 hours later) |
---|
Status | Accepté |
---|
VulDB Entry | 249442 [RRJ Nueva Ecija Engineer Online Portal 1.0 Add Enginer /admin/edit_teacher.php Firstname/Lastname cross site scripting] |
---|
Points | 20 |
---|