Soumettre #262680: kashipara Dynamic Lab Management System ≤1.0 SQL injectioninformation

Titrekashipara Dynamic Lab Management System ≤1.0 SQL injection
DescriptionSQL injection vulnerability exists in password parameter of login_process.php file of Dynamic Lab Management System Important user data or system data may be leaked and system security may be compromised The environment is secure and the information can be used by malicious users. Payload: password=0' AND (SELECT 4484 FROM (SELECT(SLEEP(5)))uNIW) AND 'oIyo'='oIyo&username=1
La source⚠️ https://github.com/VistaAX/vulnerablility/blob/main/Dynamic%20Lab%20Management%20System%20-%20vuln%202.pdf
Utilisateur
 Vista_AX (UID 60969)
Soumission05/01/2024 08:29 (il y a 2 ans)
Modérer07/01/2024 21:07 (3 days later)
StatutAccepté
Entrée VulDB249874 [Kashipara Dynamic Lab Management System jusqu’à 1.0 login_process.php Mot de passe injection SQL]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!