Soumettre #302366: campcodes Complete Online Beauty Parlor Management System ≤1.0 SQL injectioninformation

Titrecampcodes Complete Online Beauty Parlor Management System ≤1.0 SQL injection
DescriptionSQL injection vulnerability exists in adminname parameter of /admin/admin-profile.php file of Complete Online Beauty Parlor Management System Important user data or system data may be leaked and system security may be compromised The environment is secure and the information can be used by malicious users. Payload:adminname=0'XOR(if(now()=sysdate()%2Csleep(4)%2C0))XOR'Z
La source⚠️ https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%205.pdf
Utilisateur
 SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936)
Soumission21/03/2024 10:46 (il y a 2 ans)
Modérer21/03/2024 16:33 (6 hours later)
StatutAccepté
Entrée VulDB257605 [Campcodes Complete Online Beauty Parlor Management System 1.0 /admin/admin-profile.php adminname/email injection SQL]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!