Submeter #204305: Food Ordering Websiteinformação

TítuloFood Ordering Website
DescriçãoVulnerable code: https://github.com/Sakshi2610/food_ordering_website/blob/main/foodwebsite/categoryfood.php # Food Ordering Website 1.0 has a SQL injection vulnerability in categoryfood.php ## Software - Software: Food Ordering Website 1.0 - Software Link: https://github.com/Sakshi2610/food_ordering_website - Vulnerability Type: SQLi - Attack Type: Remote - Vendor of Product: Github ## Description A vulnerability has been found in Github Food Ordering Website 1.0 and classified as critical. Github Food Ordering Website 1.0 has a SQL injection vulnerability in categoryfood.php. The manipulation of the argument `id` leads to SQLi. Remote attackers can leverage this to view, modify, and delete database contents. My github writeup: https://github.com/TheCyberDiver/Public-Disclosures-CVE-/blob/main/Food-Ordering-Website%20SQLi.md
Fonte⚠️ https://github.com/TheCyberDiver/Public-Disclosures-CVE-/blob/main/Food-Ordering-Website%20SQLi.md
Utilizador
 error404unknown (UID 53361)
Submissão06/09/2023 04h56 (há 3 anos)
Moderação16/09/2023 08h37 (10 days later)
EstadoAceite
Entrada VulDB239855 [Sakshi2610 Food Ordering Website 1.0 categoryfood.php ID Injeção SQL]
Pontos18

Do you want to use VulDB in your project?

Use the official API to access entries easily!