Enviar #290939: https://www.sourcecodester.com/users/tips23 Web PHP 1 SQL Injectioninformación

Títulohttps://www.sourcecodester.com/users/tips23 Web PHP 1 SQL Injection
DescripciónExploit Title: Simple Online Bidding System SQL Injection Date: 4/08/2023 Exploit Author: y3thu Vendor Homepage: https://www.sourcecodester.com/users/tips23 Software Link: https://www.sourcecodester.com/php/14558/simple-online-bidding-system-using-phpmysqli-source-code.html Attack Vector: WEB, Network Testeted on: Kali Linux Description: The SQL injection vulnerability in an online bidding system allows attackers to inject malicious SQL code through input fields, compromising the system's database. This enables unauthorized access to sensitive data, manipulation of bids, and potential denial-of-service attacks. Mitigation involves strict input validation, parameterized queries, database access controls, security testing, and user education to prevent exploitation and ensure system integrity.
Fuente⚠️ https://github.com/yethu123/vulns-finding/blob/main/Simple%20Online%20Bidding%20System.md
Usuario
 y3thu (UID 52000)
Sumisión2024-02-29 19:01 (hace 2 años)
Moderación2024-03-01 08:45 (14 hours later)
EstadoAceptado
Entrada de VulDB255393 [SourceCodester Simple Online Bidding System 1.0 index.php category_id inyección SQL]
Puntos20

Do you want to use VulDB in your project?

Use the official API to access entries easily!