| عنوان | code-projects Simple Chat App 1.0 SQL Injection |
|---|
| الوصف | Simple Chat App 1.0 allows SQL Injection via the 'name' , 'number' and 'address' parameters at "http://localhost/chat_project/register.php/" Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit the latest vulnerabilities in the underlying database. |
|---|
| المصدر | ⚠️ https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%202.md |
|---|
| المستخدم | Burak (UID 65788) |
|---|
| ارسال | 15/05/2024 04:03 AM (2 سنوات منذ) |
|---|
| الاعتدال | 15/05/2024 10:02 PM (18 hours later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 264538 [code-projects Simple Chat System 1.0 /register.php name/number/address حقن SQL] |
|---|
| النقاط | 18 |
|---|