إرسال #475076: Home Clean Services Management System 1.0 SQL Injectionالمعلومات

عنوانHome Clean Services Management System 1.0 SQL Injection
الوصفThe reason for the SQL injection vulnerability is that the website application does not verify the validity of the data submitted by the user to the server (type, length, business parameter validity, etc.), and does not effectively filter the data input by the user with special characters , so that the user's input is directly brought into the database for execution, which exceeds the expected result of the original design of the SQL statement, resulting in a SQL injection Home Clean Services Management System does not filter the content correctly at the "process.php" id module, resulting in the generation of SQL injection.
المصدر⚠️ https://github.com/xiaosguang/cve/blob/main/Home%20Clean%20Services%20Management/Home%20Clean%20Services%20Management%20System%20process.php%20id%20SQL%20injection.md
المستخدم
 hayden (UID 79792)
ارسال05/01/2025 11:58 PM (1 سنة منذ)
الاعتدال07/01/2025 08:41 AM (1 day later)
الحالةتمت الموافقة
إدخال VulDB290443 [SourceCodester Home Clean Services Management System 1.0 process.php type/length/business حقن SQL]
النقاط20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!