4837 Total CVEs
26 Years
GitHub
README.md
Rendering markdown...
POC / Info.txt TXT
# Exploit Title: Employee Daily Task Management System 1.0 - 'Name' Stored Cross-Site Scripting (XSS)
# Vendor Homepage: https://www.sourcecodester.com/
# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/edtms.zip

# Version: v1.0

# Tested on: Windows 10

As no sanitization is performed in the `name` parameter, it is possible to send XSS payload which gets stored as a result which results in Stored XSS.

Mitigation: 

Sanitize user input to mitigate from this attack.