[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

提出 #100469: XSS injection vulnerability exists in txtvaccinationID parameter of design-and-implementation-covid-19-directory-vacination情報

TitleXSS injection vulnerability exists in txtvaccinationID parameter of design-and-implementation-covid-19-directory-vacination
DescriptionXSS injection vulnerability exists in txtvaccinationID parameter of verification.php file of design-and-implementation-covid-19-directory-vacination. With XSS, cybercriminals can turn trusted websites into malicious ones, thus causing inordinate harm and damage not only to the victims but also to the reputation of the trusted website's owner. Payload: txtvaccinationID = "<><ScRiPt>alert(9407)</ScRiPt>
Source⚠️ https://github.com/E1CHO/cve_hub/blob/main/covid-19-vaccination%20vlun%20pdf/covid-19-vaccination%20xss(1).pdf
User
 SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936)
Submission2023年03月11日 15:52 (2 年 ago)
Moderation2023年03月11日 18:40 (3 hours later)
Status承諾済み
VulDB Entry222852 [SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System verification.php クロスサイトスクリプティング]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!