Become a patron and gain access to the dashboard, Schedule scans, API and Search patron
Author
"Parshwa Bhavsar"
Platform
multiple
Release date
2020-12-02
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 | # Exploit Title: Bakeshop Online Ordering System 1.0 - 'Owner' Persistent Cross-site scripting # Date: 26-11-2020 # Exploit Author: Parshwa Bhavsar # Vendor Homepage: https://www.sourcecodester.com/ # Software Link: https://www.sourcecodester.com/php/14609/bakeshop-online-ordering-system-phpmysqli-full-source-code.html # Version: 1.0 # Tested on: Windows 10/XAMPP Payload : "><img src=x onerror=alert(1)> Steps to Reproduce :- 1. Login in admin dashboard & Click on 'Categories'. 2. You will notice the "New" button ,Click on that and You will notice the "Category" input field. 3. Put XSS Payload on that field and save it. 4. XSS will be triggered. |
Release Date | Title | Type | Platform | Author |
---|---|---|---|---|
2020-12-02 | "Bakeshop Online Ordering System 1.0 - 'Owner' Persistent Cross-site scripting" | webapps | multiple | "Parshwa Bhavsar" |
2020-12-02 | "Online News Portal System 1.0 - 'Title' Stored Cross Site Scripting" | webapps | multiple | "Parshwa Bhavsar" |
import requests
response = requests.get('https://www.nmmapper.com/api/v1/exploitdetails/49161/?format=json')
For full documentation follow the link above