Enviar #473143: Code-projects Chat System 1.0 SQL Injectioninformación

TitleCode-projects Chat System 1.0 SQL Injection
DescriptionBecause the id parameter is not sanitized or parameterized, an attacker can inject malicious SQL code to manipulate the database query. By leveraging time-based SQL injection techniques, an attacker can induce deliberate delays in the database response using functions like SLEEP(). This can be used to confirm the presence of the vulnerability and potentially extract sensitive information from the database.
Source⚠️ https://github.com/Sinon2003/cve/blob/main/sql_inject1.md
User
 Rorochan (UID 79656)
Submission2025-01-01 09:35 (hace 3 meses)
Moderation2025-01-02 09:32 (24 hours later)
StatusAceptado
VulDB Entry289938 [code-projects Chat System 1.0 /admin/deleteuser.php ID sql injection]
Points20

Might our Artificial Intelligence support you?

Check our Alexa App!