| Titre | Code Projects Simple Chat App 1.0 SQL Injection |
|---|
| Description | Simple Chat App 1.0 allows SQL Injection via the 'email' and 'password' parameters at "localhost/chat_project/login.php/". Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit the latest vulnerabilities in the underlying database. |
|---|
| La source | ⚠️ https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%201.md |
|---|
| Utilisateur | Burak (UID 65788) |
|---|
| Soumission | 15/05/2024 04:02 (il y a 2 ans) |
|---|
| Modérer | 15/05/2024 22:02 (18 hours later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 264537 [code-projects Simple Chat System 1.0 /login.php email/password injection SQL] |
|---|
| Points | 18 |
|---|