إرسال #262671: kashipara Dynamic Lab Management System ≤1.0 SQL injectionالمعلومات

عنوانkashipara Dynamic Lab Management System ≤1.0 SQL injection
الوصفSQL injection vulnerability exists in admin_password parameter of /admin/admin_login_process.php file of Dynamic Lab Management System Important user data or system data may be leaked and system security may be compromised The environment is secure and the information can be used by malicious users. Payload: admin_password=0' AND (SELECT 9477 FROM (SELECT(SLEEP(5)))TMtz) AND 'NwGl'='NwGl&admin_username=1
المصدر⚠️ https://github.com/E1CHO/cve_hub/blob/main/Dynamic%20Lab%20Management%20System%20-%20vuln%201.pdf
المستخدم
 SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936)
ارسال05/01/2024 07:32 AM (2 سنوات منذ)
الاعتدال07/01/2024 09:07 PM (3 days later)
الحالةتمت الموافقة
إدخال VulDB249873 [Kashipara Dynamic Lab Management System حتى 1.0 admin_login_process.php admin_password حقن SQL]
النقاط20

Do you want to use VulDB in your project?

Use the official API to access entries easily!