A cross site scripting (XSS) vulnerability in rems FAQ Management System v.1.0 allows a remote attacker to obtain sensitive information via a crafted payload to the Frequently Asked Question field in the Add FAQ function.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-002 | third party advisory exploit |
https://www.sourcecodester.com/php/17175/faq-management-system-using-php-and-mysql-source-code.html | product |