| عنوان | Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm V1.0 SQL Injection |
|---|
| الوصف | 'Lime' found that the file upload operation was received by the variable '$_FILES' in the 'profile.php' file. Due to the lack of proper input validation and cleaning, remote attackers can pass malicious payloads through this file upload function, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE).Attackers can exploit this vulnerability for unrestricted uploads, which may result in file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also lead to RCE |
|---|
| المصدر | ⚠️ https://github.com/hbuzs/CVE/issues/1 |
|---|
| المستخدم | Lime (UID 77066) |
|---|
| ارسال | 03/11/2024 11:20 AM (1 سنة منذ) |
|---|
| الاعتدال | 04/11/2024 10:48 AM (23 hours later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 282952 [Codezips Online Institute Management System حتى 1.0 /profile.php old_image تجاوز الصلاحيات] |
|---|
| النقاط | 20 |
|---|