Lifecycle Timeline
2DescriptionNVD
Reflected Cross-Site Scripting (XSS) vulnerability in Riftzilla's QRGen. This vulnerability allows an attavker to execute JavaScript code in the victim's browser by sending them a malicious URL using the 'id' parameter in '/article.php'. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.
AnalysisAI
Reflected Cross-Site Scripting (XSS) vulnerability in Riftzilla's QRGen. This vulnerability allows an attavker to execute JavaScript code in the victim's browser by sending them a malicious URL using the 'id' parameter in '/article.php'.
Technical ContextAI
Classified as CWE-79 (Cross-site Scripting (XSS)). Reflected Cross-Site Scripting (XSS) vulnerability in Riftzilla's QRGen. This vulnerability allows an attavker to execute JavaScript code in the victim's browser by sending them a malicious URL using the 'id' parameter in '/article.php'. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.
Affected ProductsAI
Reflected Cross-Site Scripting (XSS) vulnerability in Riftzilla's QRGen
RemediationAI
Monitor vendor advisories for a patch. Implement output encoding and Content Security Policy headers.
Share
External POC / Exploit Code
Leaving vuln.today