إرسال #592112: code-projects Chat System Using PHP With Source Code 1.0 SQL Injectionالمعلومات

عنوانcode-projects Chat System Using PHP With Source Code 1.0 SQL Injection
الوصفThe cid parameter in /user/confirm_password.php is not properly sanitized or parameterized, which leaves it vulnerable to SQL injection attacks. Attackers can exploit this by injecting malicious SQL code to manipulate the database queries. Utilizing time-based SQL injection methods, they can introduce intentional delays in the database response through functions such as SLEEP(). This technique can be employed to verify the existence of the vulnerability and may also be used to extract sensitive information from the database.
المصدر⚠️ https://github.com/LamentXU123/cve/blob/main/sql4.md
المستخدم
 LamentXU (UID 78142)
ارسال06/06/2025 08:34 PM (11 أشهر منذ)
الاعتدال08/06/2025 09:27 PM (2 days later)
الحالةتمت الموافقة
إدخال VulDB311639 [code-projects Chat System حتى 1.0 confirm_password.php cid حقن SQL]
النقاط20

Interested in the pricing of exploits?

See the underground prices here!