漏洞标题
MAGESH-K21在线大学活动大厅预订系统收据.php跨站脚本攻击
漏洞描述信息
发现一个分类为有问题的漏洞存在于MAGESH-K21在线学院活动大厅预订系统 1.0 中。受影响的是文件/admin/receipt.php中的未知函数。通过操纵参数id可以导致跨站脚本攻击。有可能远程发起攻击。漏洞已公开披露,并可能被利用。VDB-256962是分配给这个漏洞的标识符。注意:供应商很早就联系了关于此次披露的事情,但没有以任何方式回应。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
漏洞类别
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
漏洞标题
MAGESH-K21 Online-College-Event-Hall-Reservation-System receipt.php cross site scripting
漏洞描述信息
A vulnerability, which was classified as problematic, was found in MAGESH-K21 Online-College-Event-Hall-Reservation-System 1.0. Affected is an unknown function of the file /admin/receipt.php. The manipulation of the argument id leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-256962 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
漏洞类别
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
漏洞标题
Online-College-Event-Hall-Reservation-System 跨站脚本漏洞
漏洞描述信息
Online-College-Event-Hall-Reservation-System是Magesh K个人开发者的一个在线大学活动大厅预订系统。旨在实现大厅预订流程自动化,以消除手动记录并提高效率。 Online-College-Event-Hall-Reservation-System 存在跨站脚本漏洞,该漏洞源于文件 /admin/receipt.php 的参数 id 存在跨站脚本漏洞。
CVSS信息
N/A
漏洞类别
跨站脚本