Dear Ladies and Gentlemen,
First of all thank you for your time and effort reading my Report.
While doing the Penetration Test i was able to identify an reflected HTML-Injection.
The Process of the Vulnerability:
The Attacker can inject Link, Phishing Links, etc. to inject malicious Code
Through this, any Attacker can inject HTML Code and use further Vulnerabilities to use other Exploitation Steps.
At the end, I want to thank you for your time and effort and hope hearing from you soon.
Best regards
Ahmed Hassan