| عنوان | code-projects Real Estate Property Management System 0/1 php SQL Injection |
|---|
| الوصف | An unrestricted SQL injection attack exists in an Real Estate Property Management System. The parameters that can be controlled are as follows: $Email parameter . This function executes the id parameter into the SQL statement without any restrictions. A malicious attacker could exploit this vulnerability to obtain sensitive information in the server database.
|
|---|
| المصدر | ⚠️ https://github.com/yiijiayan/cve/blob/main/sql-cve.md |
|---|
| المستخدم | yijiayan (UID 82471) |
|---|
| ارسال | 07/03/2025 04:01 PM (1 سنة منذ) |
|---|
| الاعتدال | 16/03/2025 06:05 PM (9 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 299883 [code-projects Real Estate Property Management System 1.0 Parameter /InsertCustomer.php حقن SQL] |
|---|
| النقاط | 19 |
|---|