| Titre | SourceCodester Leads Manager Tool July 30, 2024 SQL Injection |
|---|
| Description | The reason for the SQL injection vulnerability is that the website application does not verify the validity of the data submitted by the user to the server (type, length, business parameter validity, etc.), and does not effectively filter the data input by the user with special characters , so that the user's input is directly brought into the database for execution, which exceeds the expected result of the original design of the SQL statement, resulting in a SQL injection vulnerability.Online Bank Management System does not filter the content correctly at the "endpoint/delete-leads.php" parameter, resulting in the generation of SQL injection. |
|---|
| La source | ⚠️ https://github.com/joinia/webray.com.cn/blob/main/Leads-Manager-Tool/leadmanagersql.md |
|---|
| Utilisateur | joinia (UID 24916) |
|---|
| Soumission | 07/08/2024 10:38 (il y a 2 ans) |
|---|
| Modérer | 09/08/2024 08:22 (2 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 274064 [SourceCodester Leads Manager Tool 1.0 Delete Leads delete-leads.php leads injection SQL] |
|---|
| Points | 20 |
|---|