[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Submit #100469: XSS injection vulnerability exists in txtvaccinationID parameter of design-and-implementation-covid-19-directory-vacinationinfo

TitleXSS injection vulnerability exists in txtvaccinationID parameter of design-and-implementation-covid-19-directory-vacination
DescriptionXSS injection vulnerability exists in txtvaccinationID parameter of verification.php file of design-and-implementation-covid-19-directory-vacination. With XSS, cybercriminals can turn trusted websites into malicious ones, thus causing inordinate harm and damage not only to the victims but also to the reputation of the trusted website's owner. Payload: txtvaccinationID = "<><ScRiPt>alert(9407)</ScRiPt>
Source⚠️ https://github.com/E1CHO/cve_hub/blob/main/covid-19-vaccination%20vlun%20pdf/covid-19-vaccination%20xss(1).pdf
User
 SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936)
Submission11/03/2023 15:52 (2 år sedan)
Moderation11/03/2023 18:40 (3 hours later)
StatusAccepterad
VulDB Entry222852 [SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System verification.php cross site scripting]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!