提交 #335190: SourceCodester Interactive Map App 1.0 SQL Injection信息

标题SourceCodester Interactive Map App 1.0 SQL Injection
描述İnteractive Map App 1.0 allows SQL Injection via the 'mark' parameter at "http://localhost/interactive-map-marker/endpoint/delete-mark.php?mark=7". Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit the latest vulnerabilities in the underlying database.
来源⚠️ https://github.com/BurakSevben/CVEs/blob/main/Interactive%20Map%20App/Interactive%20Map%20App%20-%20SQL%20Injection.md
用户
 Burak (UID 65788)
提交2024-05-15 03時13分 (2 年前)
管理2024-05-15 21時25分 (18 hours later)
状态已接受
VulDB条目264535 [SourceCodester Interactive Map with Marker 1.0 delete-mark.php mark SQL注入]
积分18

Want to know what is going to be exploited?

We predict KEV entries!