Soumettre #335190: SourceCodester Interactive Map App 1.0 SQL Injectioninformation

TitreSourceCodester Interactive Map App 1.0 SQL Injection
Descriptionİnteractive Map App 1.0 allows SQL Injection via the 'mark' parameter at "http://localhost/interactive-map-marker/endpoint/delete-mark.php?mark=7". Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit the latest vulnerabilities in the underlying database.
La source⚠️ https://github.com/BurakSevben/CVEs/blob/main/Interactive%20Map%20App/Interactive%20Map%20App%20-%20SQL%20Injection.md
Utilisateur
 Burak (UID 65788)
Soumission15/05/2024 03:13 (il y a 2 ans)
Modérer15/05/2024 21:25 (18 hours later)
StatutAccepté
Entrée VulDB264535 [SourceCodester Interactive Map with Marker 1.0 delete-mark.php mark injection SQL]
Points18

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!