ଜମା କରନ୍ତୁ #48119: Human Resource Management System v1.0 - Stored XSSସୂଚନା

ଶୀର୍ଷକHuman Resource Management System v1.0 - Stored XSS
ବର୍ଣ୍ଣନା# Exploit Title: Human Resource Management System - Stored XSS # Exploit Author: Pratik Shetty # Vendor Name: oretnom23 # Vendor Homepage: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html # Software Link: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html # Version: v1.0 # Tested on: Windows 10, Apache Description: A Stored XSS issue in Human Resource Management System v.1.0 allows to inject Arbitrary JavaScript in Edit in "First Name", " Middle Name " and "Last Name". Payload: <script>confirm(1)</script> Steps: 1) Login into your admin account 2) Now in that go to "Add Employee" 3) In that fill the details but in "First Name" , "Middle Name" and "Last Name" put your payload Payload: <script>confirm(1)</script> 4) Now save the details of that employee 5) Now go to "Employee New" Tab and our payload has been executed
ଉପଭୋକ୍ତା
 draco (UID 24011)
ଦାଖଲ10/13/2022 03:19 PM (3 ବର୍ଷ ବର୍ଷ ago)
ମଧ୍ୟମ ଧରଣର10/13/2022 04:56 PM (2 hours later)
ସ୍ଥିତିଗ୍ରହଣ କରାଯାଇଛି
VulDB ଏଣ୍ଟ୍ରି210773 [SourceCodester Human Resource Management System 1.0 Add Employee First Name/Middle Name/Last Name କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ]
ପଏଣ୍ଟ17

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!