SQL injection vulnerability was discovered in Point of Sales in PHP/PDO 1.0, which can be exploited via the id parameter to edit_category.php.
References
Link | Resource |
---|---|
https://github.com/BigTiger2020/Point-of-Sales/blob/main/README.md | Exploit Third Party Advisory |
https://projectworlds.in/free-projects/php-projects/online-doctor-appointment-booking-system-php-and-mysql | Not Applicable |
https://www.sourcecodester.com/php/14540/point-sales-phppdo-full-source-code-2020.html | Product Third Party Advisory |
https://github.com/BigTiger2020/Point-of-Sales/blob/main/README.md | Exploit Third Party Advisory |
https://projectworlds.in/free-projects/php-projects/online-doctor-appointment-booking-system-php-and-mysql | Not Applicable |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/BigTiger2020/Point-of-Sales/blob/main/README.md - Exploit, Third Party Advisory | |
References | () https://projectworlds.in/free-projects/php-projects/online-doctor-appointment-booking-system-php-and-mysql - Not Applicable |
Information
Published : 2020-12-02 22:15
Updated : 2024-11-21 05:23
NVD link : CVE-2020-29285
Mitre link : CVE-2020-29285
CVE.ORG link : CVE-2020-29285
JSON object : View
Products Affected
point_of_sales_in_php\/pdo_project
- point_of_sales_in_php\/pdo
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')