Submit #335200: code-projects Simple Chat App 1.0 SQL Injectioninfo

Titlecode-projects Simple Chat App 1.0 SQL Injection
DescriptionSimple Chat App 1.0 allows SQL Injection via the 'name' , 'number' and 'address' parameters at "http://localhost/chat_project/register.php/" Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit the latest vulnerabilities in the underlying database.
Source⚠️ https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%202.md
UserBurak (ID 65788)
Submission05/15/2024 04:03 (2 months ago)
Moderation05/15/2024 22:02 (18 hours later)
StatusAccepted
VulDB Entry264538

Want to stay up to date on a daily basis?

Enable the mail alert feature now!