| Title | code-projects Online Examination System 1 SQL Injection |
|---|
| Description | SQL Injection on Login Page.
The insecure usage of "mysql_*", which is deprecated, is used across the project. Here's a sample endpoint where an sqli gets you logged into the admin account (muler, by default):
/onexam/index.php
|
|---|
| Source | ⚠️ https://github.com/geo-chen/code-projects/blob/main/Online%20Examination%20System%20In%20PHP%20With%20Source%20Code.md#finding-2-sql-injection-on-login-page |
|---|
| User | geochen (UID 78995) |
|---|
| Submission | 01/12/2026 05:23 PM (2 months ago) |
|---|
| Moderation | 01/25/2026 06:07 PM (13 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 342838 [code-projects Online Examination System 1.0 Login Page /index.php User sql injection] |
|---|
| Points | 17 |
|---|