| Título | Advocate office management system free download edit_act.php v1.0 SQL Injection |
|---|
| Descripción | The 49 line of the edit_act.php file uses the PHP method to retrieve user input from the GET element. Then, the value of this element is passed to the code without proper cleaning or validation, and ultimately used for database queries. This may lead to SQL injection attacks.
baiyunjian has discovered that due to insufficient protection of the "id" parameter in the "edit_act.php" file, "Advocate office management system free download" there is a serious security vulnerability in the This vulnerability may be used to inject malicious SQL queries, resulting in unauthorized access and extraction of sensitive information from the database. |
|---|
| Fuente | ⚠️ https://github.com/Hefei-Coffee/cve/issues/14 |
|---|
| Usuario | bingbingliang (UID 82659) |
|---|
| Sumisión | 2025-03-11 08:40 (hace 1 Año) |
|---|
| Moderación | 2025-03-21 14:18 (10 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 300588 [SourceCodester Kortex Lite Advocate Office Management System 1.0 edit_act.php ID inyección SQL] |
|---|
| Puntos | 20 |
|---|