![]() ![]() Hospital_management_system_project - hospital_management_system A remote attacker can use this vulnerability to execute arbitrary code on the server where the bulletin board is running. SQL-Injection vulnerability caused by the lack of verification of input values for the table name of DB used by the Mangboard bulletin board. Multiple SQL Injection vulnerabilies in tourist5 Online-food-ordering-system 1.0. Online_food_ordering_system_project - online_food_ordering_system ![]() ![]() SQL Injection vulnerability in inxedu 2.0.6 allows attackers to execute arbitrary commands via the functionIds parameter to /saverolefunction.Īn issue was discovered in Electerm 1.3.22, allows attackers to execute arbitrary code via unverified request to electerms service. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis. Patch information is provided when available. This information may include identifying information, values, definitions, and related links.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |