We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Suggested description] Tbed was discovered to contain a SQL injection vulnerability via the searchname parameter.
[Vulnerability Type] SQLi
[Vendor of Product] https://github.com/Hello-hao/Tbed
[Affected Product Code Base] v20240111
[Affected Component]
/admin/selectPhoto
[Attack Type] Remote
[Vulnerability details]
[Impact Code execution] true
[Cause of vulnerability] The searchname parameter was used in ${} format which can cause SQL Injection Vulnerability.
That's all, thanks.
The text was updated successfully, but these errors were encountered:
Thank you for raising this vulnerability. I will make improvements in the next version.
Sorry, something went wrong.
No branches or pull requests
[Suggested description]
Tbed was discovered to contain a SQL injection vulnerability via the searchname parameter.
[Vulnerability Type]
SQLi
[Vendor of Product]
https://github.com/Hello-hao/Tbed
[Affected Product Code Base]
v20240111
[Affected Component]
/admin/selectPhoto
[Attack Type]
Remote
[Vulnerability details]
[Impact Code execution]
true
[Cause of vulnerability]
The searchname parameter was used in ${} format which can cause SQL Injection Vulnerability.
That's all, thanks.
The text was updated successfully, but these errors were encountered: