This exploit demonstrates SQL injection and reflected XSS vulnerabilities in Foodspotting Clone v1.0. The SQLi payloads include time-based blind and UNION-based queries, while the XSS payload uses an SVG onload event to trigger an alert.
Classification
Working Poc 90%
Attack Type
Sqli | Xss
Complexity
Trivial
Reliability
Reliable
Target:Foodspotting Clone v1.0
No auth needed
Prerequisites:Access to the vulnerable web application