Title | kashipara Food Management System ≤1.0 SQL injection |
---|
Description | SQL injection vulnerability exists in id parameter of partylist_edit_submit.php file of Food Management System
Important user data or system data may be leaked and system security may be compromised
The environment is secure and the information can be used by malicious users.
Payload: action=deleteType&id=0' AND 3666=(SELECT (CASE WHEN (3666=3666) THEN 3666 ELSE (SELECT 7429 UNION SELECT 7315) END))-- - |
---|
Source | ⚠️ https://github.com/E1CHO/cve_hub/blob/main/Food%20Management%20System/Food%20Management%20System%20-%20vuln%2010.pdf |
---|
User | SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936) |
---|
Submission | 03.01.2024 11:14 (1 Год назад) |
---|
Moderation | 06.01.2024 11:15 (3 days later) |
---|
Status | принято |
---|
VulDB Entry | 249833 [Kashipara Food Management System up to 1.0 partylist_edit_submit.php id sql injection] |
---|
Points | 20 |
---|