प्रस्तुत करा #48119: Human Resource Management System v1.0 - Stored XSSमाहिती:

पदवीHuman Resource Management System v1.0 - Stored XSS
वर्णन# Exploit Title: Human Resource Management System - Stored XSS # Exploit Author: Pratik Shetty # Vendor Name: oretnom23 # Vendor Homepage: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html # Software Link: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html # Version: v1.0 # Tested on: Windows 10, Apache Description: A Stored XSS issue in Human Resource Management System v.1.0 allows to inject Arbitrary JavaScript in Edit in "First Name", " Middle Name " and "Last Name". Payload: <script>confirm(1)</script> Steps: 1) Login into your admin account 2) Now in that go to "Add Employee" 3) In that fill the details but in "First Name" , "Middle Name" and "Last Name" put your payload Payload: <script>confirm(1)</script> 4) Now save the details of that employee 5) Now go to "Employee New" Tab and our payload has been executed
उपयोगकर्ता
 draco (UID 24011)
आधीनता13/10/2022 03:19 PM (3 वर्षानुवर्षे ago)
नेमस्तपणा13/10/2022 04:56 PM (2 hours later)
स्थानमान्य केले
VulDB entry210773 [SourceCodester Human Resource Management System 1.0 Add Employee First Name/Middle Name/Last Name क्रॉस साइट स्क्रिप्टिंग]
मुद्दे17

Might our Artificial Intelligence support you?

Check our Alexa App!