Title | XSS injection vulnerability exists in txtvaccinationID parameter of design-and-implementation-covid-19-directory-vacination |
---|
Description | XSS injection vulnerability exists in txtvaccinationID parameter of verification.php file of design-and-implementation-covid-19-directory-vacination.
With XSS, cybercriminals can turn trusted websites into malicious ones, thus causing inordinate harm and damage not only to the victims but also to the reputation of the trusted website's owner.
Payload:
txtvaccinationID = "<><ScRiPt>alert(9407)</ScRiPt> |
---|
Source | ⚠️ https://github.com/E1CHO/cve_hub/blob/main/covid-19-vaccination%20vlun%20pdf/covid-19-vaccination%20xss(1).pdf |
---|
User | SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936) |
---|
Submission | 11/03/2023 15:52 (2 år sedan) |
---|
Moderation | 11/03/2023 18:40 (3 hours later) |
---|
Status | Accepterad |
---|
VulDB Entry | 222852 [SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System verification.php cross site scripting] |
---|
Points | 20 |
---|