![]() ![]() The exploit has been disclosed to the public and may be used. It is possible to launch the attack remotely. The manipulation of the argument usario/senha leads to sql injection. Affected is an unknown function of the file index.php. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.Ī vulnerability, which was classified as critical, was found in codeprojects Farmacia 1.0. ![]() The associated identifier of this vulnerability is VDB-241647. It is possible to initiate the attack remotely. The manipulation of the argument searchdata/searchdata/searchdata leads to sql injection. This affects an unknown part of the file /course/filterRecords/ of the component HTTP POST Request Handler. VDB-241650 is the identifier assigned to this vulnerability.Ī vulnerability was found in QDocs Smart School 6.4.1. The manipulation of the argument WELFARE_ID leads to sql injection. Affected is an unknown function of the file general/hr/salary/welfare_manage/delete.php. A vulnerability classified as critical has been found in Tongda OA 2017 11.10. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |