| Titel | kishor-23 Food Waste Management System 1.0 Execution After Redirect |
|---|
| Beschreibung | The web application is vulnerable to execution after redirect attack and the attacker are able to access admin pages and manipulate the data. |
|---|
| Quelle | ⚠️ https://github.com/vanitashtml/CVE-Dumps/blob/main/Execute%20After%20Redirect%20-%20Food%20Management%20System.md |
|---|
| Benutzer | rjavenido22 (UID 64261) |
|---|
| Einreichung | 07.03.2024 07:26 (vor 2 Jahren) |
|---|
| Moderieren | 16.03.2024 07:49 (9 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 257056 [kishor-23 Food Waste Management System 1.0 /admin/admin.php erweiterte Rechte] |
|---|
| Punkte | 15 |
|---|