Bus Booking Script has XSS via the results.php datepicker parameter or the admin/new_master.php spemail parameter.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/d4wner/Vulnerabilities-Report/blob/master/Bus-Booking-Script.md | third party advisory exploit |