0clickjacking0
0clickjacking0
### Vulnerability file address `net-banking/send_funds.php` from line 9,The `$_GET['cust_id']` parameter is controllable, the parameter cust_id can be passed through get, and the `$id` is not protected from sql injection, line...
### Vulnerability file address `net-banking/delete_customer.php` from line 16,The `$_GET['cust_id']` parameter is controllable, the parameter cust_id can be passed through get, and the `$_GET['cust_id']` is not protected from sql injection, line...
### Vulnerability file address `net-banking/edit_customer.php` from line 16,The `$_GET['cust_id']` parameter is controllable, the parameter cust_id can be passed through get, and the `$_GET['cust_id']` is not protected from sql injection, line...
### Vulnerability file address `net-banking/edit_customer_action.php` from line 16,The `$_GET['cust_id']` parameter is controllable, the parameter cust_id can be passed through get, and the `$_GET['cust_id']` is not protected from sql injection, line...
### Vulnerability file address `net-banking/customer_transactions.php` from line 39,The `$_POST['search_term']` parameter is controllable, the parameter search_term can be passed through post, and the `$_POST['search_term']` is not protected from sql injection, line...
### Vulnerability file address `net-banking/beneficiary.php` from line 74,The `$_POST['search']` parameter is controllable, the parameter search can be passed through post, and the `$search` is not protected from sql injection, line...
### Vulnerability file address `net-banking/manage_customers.php` from line 11,The `$_POST['search']` parameter is controllable, the parameter search can be passed through post, and the `$search` is not protected from sql injection, line...
### Vulnerability file address `net-banking/transactions.php` from line 28,The `$_POST['search_term']` parameter is controllable, the parameter search_term can be passed through post, and the `$_POST['search_term']` is not protected from sql injection, line...
### Vulnerability file address `net-banking/delete_beneficiary.php` from line 17,The `$_GET['cust_id']` parameter is controllable, the parameter cust_id can be passed through get, and the `$_GET['cust_id']` is not protected from sql injection, line...
### Vulnerability file address `patient/delete-appointment.php` from line 3,the problem is at line 11 `header("location: ../login.php");`,there is no exit() termination statement after the header function in the else statement, so that...