Enviar #797087: PHPGurukul Company Visitors Management System 2.0 SQL Injectioninformación

TítuloPHPGurukul Company Visitors Management System 2.0 SQL Injection
DescripciónA SQL injection vulnerability was identified within the "/index.php" file of the "Company Visitors Management System" project. The root cause lies in the fact that attackers can inject malicious code via the parameter "username". This input is then directly utilized in SQL queries without undergoing proper sanitization or validation processes. As a result, attackers are able to fabricate input values, manipulate SQL queries, and execute unauthorized operations.
Fuente⚠️ https://github.com/f1rstb100d/CVE/issues/37
Usuario
 Anonymous User
Sumisión2026-04-04 15:15 (hace 22 días)
Moderación2026-04-12 22:35 (8 days later)
EstadoDuplicado
Entrada de VulDB299966 [PHPGurukul Company Visitor Management System 2.0 Sign In /index.php Nombre de usuario inyección SQL]
Puntos0

Interested in the pricing of exploits?

See the underground prices here!