| Título | code-projects Real Estate Property Management System 0/1 php SQL Injection |
|---|
| Descripción | An unrestricted SQL injection attack exists in an Real Estate Property Management System. The parameters that can be controlled are as follows: $Email parameter . This function executes the id parameter into the SQL statement without any restrictions. A malicious attacker could exploit this vulnerability to obtain sensitive information in the server database.
|
|---|
| Fuente | ⚠️ https://github.com/yiijiayan/cve/blob/main/sql-cve.md |
|---|
| Usuario | yijiayan (UID 82471) |
|---|
| Sumisión | 2025-03-07 16:01 (hace 1 Año) |
|---|
| Moderación | 2025-03-16 18:05 (9 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 299883 [code-projects Real Estate Property Management System 1.0 Parameter /InsertCustomer.php inyección SQL] |
|---|
| Puntos | 19 |
|---|