Headline
CVE-2022-3012: GitHub - 0x14dli/ffos-SQL-injection-vulnerability-exists: ffos/admin/reports/index.php Line 64 of PHP calls the SQL query built through untrusted data source input. Through this call, an attacker can
A vulnerability was found in oretnom23 Fast Food Ordering System. It has been rated as critical. Affected by this issue is some unknown functionality of the file ffos/admin/reports/index.php. The manipulation of the argument date leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-207422 is the identifier assigned to this vulnerability.
main
Switch branches/tags
1 branch 0 tags
Code
Clone
Use Git or checkout with SVN using the web URL.
Open with GitHub Desktop
Download ZIP
Latest commit
0x14dli Update README.md
fa969f0
Aug 27, 2022
Update README.md
fa969f0
Git stats
- 3 commits
FilesPermalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
README.md
屏幕截图 2022-08-27 113253.png
屏幕截图 2022-08-27 113336.png
README.md
ffos-SQL-injection-vulnerability-exists
Project address:https://www.sourcecodester.com/php/15366/fast-food-ordering-system-phpoop-free-source-code.html ffos/admin/reports/index.php Line 64 of PHP calls the SQL query built through untrusted data source input. Through this call, an attacker can modify the meaning of a statement or execute arbitrary SQL commands
About
ffos/admin/reports/index.php Line 64 of PHP calls the SQL query built through untrusted data source input. Through this call, an attacker can modify the meaning of a statement or execute arbitrary SQL commands
Resources
Readme
Stars
0 stars
Watchers
1 watching
Forks
0 forks
Releases
No releases published
Packages
No packages published