![]() The exploit has been disclosed to the public and may be used. The manipulation of the argument password leads to sql injection. This vulnerability affects unknown code of the file login.php. Supported OS: Windows 10 / Windows 8.A vulnerability was found in SourceCodester Judging Management System 1.0.Technical Details and System Requirements ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |