Soumettre #262671: kashipara Dynamic Lab Management System ≤1.0 SQL injectioninformation

Titrekashipara Dynamic Lab Management System ≤1.0 SQL injection
DescriptionSQL injection vulnerability exists in admin_password parameter of /admin/admin_login_process.php file of Dynamic Lab Management System Important user data or system data may be leaked and system security may be compromised The environment is secure and the information can be used by malicious users. Payload: admin_password=0' AND (SELECT 9477 FROM (SELECT(SLEEP(5)))TMtz) AND 'NwGl'='NwGl&admin_username=1
La source⚠️ https://github.com/E1CHO/cve_hub/blob/main/Dynamic%20Lab%20Management%20System%20-%20vuln%201.pdf
Utilisateur
 SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936)
Soumission05/01/2024 07:32 (il y a 2 ans)
Modérer07/01/2024 21:07 (3 days later)
StatutAccepté
Entrée VulDB249873 [Kashipara Dynamic Lab Management System jusqu’à 1.0 admin_login_process.php admin_password injection SQL]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!