![]() ![]() The exploit has been disclosed to the public and may be used. The manipulation of the argument userName leads to sql injection. Affected by this issue is some unknown functionality of the file /user_registration/ of the component User Registration. The associated identifier of this vulnerability is VDB-249135.Ī vulnerability was found in code-projects Intern Membership Management System 2.0 and classified as critical. ![]() The manipulation of the argument userName/firstName/lastName/userEmail with the input ">confirm(document.domain)h0la leads to cross site scripting. This affects an unknown part of the file /user_registration/ of the component User Registration. A vulnerability was found in code-projects Intern Membership Management System 2.0. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |