| Title | code-projects Simple Admin Panel In PHP 1.0 SQL Injection |
|---|
| Description | The SQL Injection vulnerability here exists because the 'c_name' parameter is directly inserted into the SQL queries without any validation or sanitization. If an attacker inputs malicious SQL code as the 'c_name' parameter, it will be executed by the database. For example, if the 'c_name' parameter is set to '"aaa"||(SELECT 0x48596768 WHERE 1939=1939 AND 4701=4701)||', it could manipulate the query to return or modify unintended data. Always use prepared statements or parameterized queries to prevent this.
|
|---|
| Source | ⚠️ https://code-projects.org/simple-admin-panel-in-php-with-source-code/ |
|---|
| User | Fergod (UID 55882) |
|---|
| Submission | 12/23/2024 11:17 PM (1 Year ago) |
|---|
| Moderation | 12/25/2024 03:50 PM (2 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 289281 [code-projects Simple Admin Panel 1.0 c_name sql injection] |
|---|
| Points | 20 |
|---|