![]() The manipulation of the argument EMAIL_ID leads to sql injection. This vulnerability affects unknown code of the file pda/pad/email/delete.php. The associated identifier of this vulnerability is VDB-247895.Ī vulnerability was found in Tongda OA 2017 up to 11.9. The exploit has been disclosed to the public and may be used. The manipulation of the argument name leads to sql injection. This issue affects the function prepare of the file email_setup.php. The identifier VDB-248737 was assigned to this vulnerability.Ī malicious user could potentially use the Sitefinity system for the distribution of phishing emails.Ī vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. The manipulation of the argument name/email leads to cross site scripting. Affected by this vulnerability is an unknown functionality of the file user/profile.php. A vulnerability has been found in PHPGurukul Online Notes Sharing System 1.0 and classified as problematic.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |