![]() ![]() The exploit has been disclosed to the public and may be used. ![]() ![]() The manipulation of the argument change leads to unrestricted upload. This issue affects some unknown processing of the file student_avatar.php. The identifier of this vulnerability is VDB-240912.Ī vulnerability, which was classified as critical, has been found in SourceCodester Engineers Online Portal 1.0. It is possible to launch the attack remotely. The manipulation of the argument uploaded_file leads to unrestricted upload. Affected is an unknown function of the file upload_save_student.php. The identifier of this vulnerability is VDB-243728.Ī vulnerability classified as critical has been found in SourceCodester Engineers Online Portal 1.0. The manipulation leads to unrestricted upload. Affected by this issue is some unknown functionality of the file student_avatar.php. A vulnerability was found in code-projects Admission Management System 1.0. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |