| Título | code-projects Church Donation System 1.0 SQL Injection |
|---|
| Descripción | A SQL injection vulnerability was identified in the login form (username parameter) of /admin/index.php. The injection point is in the POST request body and was confirmed to be exploitable via boolean-based blind and time-based blind techniques. |
|---|
| Fuente | ⚠️ https://github.com/enigma522/cve/issues/1 |
|---|
| Usuario | Enigma522 (UID 88000) |
|---|
| Sumisión | 2025-07-22 14:33 (hace 9 meses) |
|---|
| Moderación | 2025-07-25 09:25 (3 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 317580 [code-projects Church Donation System 1.0 HTTP POST Request /admin/index.php Nombre de usuario inyección SQL] |
|---|
| Puntos | 17 |
|---|