Submit #780406: code-projects Simple Gym Management System 1.0 SQL Injectioninfo

Titelcode-projects Simple Gym Management System 1.0 SQL Injection
BeschreibungThe payment functionality directly concatenates Payment_id, Amount, customer_id, payment_type, and customer_name into the INSERT statement without any filtering. An attacker could manipulate payment data, resulting in financial loss. Impact: An attacker could manipulate payment data to alter amounts, forge payment records, cause financial loss, or even obtain all payment information.
Quelle⚠️ https://github.com/maidangdang1/CVE/issues/5
Benutzer
 nomath (UID 96446)
Einreichung15.03.2026 11:05 (vor 22 Tagen)
Moderieren31.03.2026 10:52 (16 days later)
StatusAkzeptiert
VulDB Eintrag354336 [code-projects Simple Gym Management System 1.0 Payment SQL Injection]
Punkte20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!