| Titre | code-projects Real Estate Property Management System 0/1 php SQL Injection |
|---|
| Description | An unrestricted SQL injection attack exists in an Real Estate Property Management System. The parameters that can be controlled are as follows: $Email parameter . This function executes the id parameter into the SQL statement without any restrictions. A malicious attacker could exploit this vulnerability to obtain sensitive information in the server database.
|
|---|
| La source | ⚠️ https://github.com/yiijiayan/cve/blob/main/sql-cve.md |
|---|
| Utilisateur | yijiayan (UID 82471) |
|---|
| Soumission | 07/03/2025 16:01 (il y a 1 Année) |
|---|
| Modérer | 16/03/2025 18:05 (9 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 299883 [code-projects Real Estate Property Management System 1.0 Parameter /InsertCustomer.php injection SQL] |
|---|
| Points | 19 |
|---|