Title | code-projects Courier Management System 1.0 SQL Injection |
---|
Description | Due to insufficient user input verification for the "txtusername" parameter, a serious SQL injection vulnerability has been discovered in the "Courier Management System In PHP With Source Code", allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information without logging in. Immediate remedial measures are needed to ensure system security and protect data integrity.
|
---|
Source | ⚠️ https://github.com/AXUyaku/cve/issues/1 |
---|
User | Axure (UID 76909) |
---|
Submission | 10/31/2024 03:25 AM (9 months ago) |
---|
Moderation | 10/31/2024 04:37 PM (13 hours later) |
---|
Status | Accepted |
---|
VulDB Entry | 282617 [code-projects Courier Management System 1.0 /login.php txtusername sql injection] |
---|
Points | 20 |
---|