| عنوان | PHPGurukul News Portal Project 4.1 SQL Injection |
|---|
| الوصف | A SQL injection vulnerability was identified within the "/admin/check_availability.php" file of the "News Portal Project" project. The root cause lies in the fact that attackers can inject malicious code via the parameter "username". This input is then directly utilized in SQL queries without undergoing proper sanitization or validation processes. As a result, attackers are able to fabricate input values, manipulate SQL queries, and execute unauthorized operations. |
|---|
| المصدر | ⚠️ https://github.com/f1rstb100d/CVE/issues/29 |
|---|
| المستخدم | Anonymous User |
|---|
| ارسال | 26/03/2026 09:02 AM (18 أيام منذ) |
|---|
| الاعتدال | 08/04/2026 07:32 PM (13 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 356296 [PHPGurukul News Portal Project 4.1 check_availability.php أسم المستخدم حقن SQL] |
|---|
| النقاط | 20 |
|---|