Soumettre #632395: PHPGurukul User Management System in PHP using Stored Procedure v1.0 SQL Injectioninformation

TitrePHPGurukul User Management System in PHP using Stored Procedure v1.0 SQL Injection
DescriptionA SQL injection vulnerability was found in the '/signup.php' User Management System in PHP using Stored Procedure ' project. The reason for this issue is that attackers inject malicious code from the parameter 'emailid' and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
La source⚠️ https://github.com/chenjunjie3/cve/issues/5
Utilisateur
 chenjunjie (UID 88914)
Soumission12/08/2025 11:07 (il y a 9 mois)
Modérer21/08/2025 07:30 (9 days later)
StatutAccepté
Entrée VulDB320907 [PHPGurukul User Management System 1.0 /signup.php emailid injection SQL]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!