Soumettre #204305: Food Ordering Websiteinformation

TitreFood Ordering Website
DescriptionVulnerable code: https://github.com/Sakshi2610/food_ordering_website/blob/main/foodwebsite/categoryfood.php # Food Ordering Website 1.0 has a SQL injection vulnerability in categoryfood.php ## Software - Software: Food Ordering Website 1.0 - Software Link: https://github.com/Sakshi2610/food_ordering_website - Vulnerability Type: SQLi - Attack Type: Remote - Vendor of Product: Github ## Description A vulnerability has been found in Github Food Ordering Website 1.0 and classified as critical. Github Food Ordering Website 1.0 has a SQL injection vulnerability in categoryfood.php. The manipulation of the argument `id` leads to SQLi. Remote attackers can leverage this to view, modify, and delete database contents. My github writeup: https://github.com/TheCyberDiver/Public-Disclosures-CVE-/blob/main/Food-Ordering-Website%20SQLi.md
La source⚠️ https://github.com/TheCyberDiver/Public-Disclosures-CVE-/blob/main/Food-Ordering-Website%20SQLi.md
Utilisateur
 error404unknown (UID 53361)
Soumission06/09/2023 04:56 (il y a 3 ans)
Modérer16/09/2023 08:37 (10 days later)
StatutAccepté
Entrée VulDB239855 [Sakshi2610 Food Ordering Website 1.0 categoryfood.php ID injection SQL]
Points18

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!