Enviar #780406: code-projects Simple Gym Management System 1.0 SQL Injectioninformación

Títulocode-projects Simple Gym Management System 1.0 SQL Injection
DescripciónThe payment functionality directly concatenates Payment_id, Amount, customer_id, payment_type, and customer_name into the INSERT statement without any filtering. An attacker could manipulate payment data, resulting in financial loss. Impact: An attacker could manipulate payment data to alter amounts, forge payment records, cause financial loss, or even obtain all payment information.
Fuente⚠️ https://github.com/maidangdang1/CVE/issues/5
Usuario
 nomath (UID 96446)
Sumisión2026-03-15 11:05 (hace 18 días)
Moderación2026-03-31 10:52 (16 days later)
EstadoAceptado
Entrada de VulDB354336 [code-projects Simple Gym Management System 1.0 Payment inyección SQL]
Puntos20

Interested in the pricing of exploits?

See the underground prices here!