Soumettre #797087: PHPGurukul Company Visitors Management System 2.0 SQL Injectioninformation

TitrePHPGurukul Company Visitors Management System 2.0 SQL Injection
DescriptionA SQL injection vulnerability was identified within the "/index.php" file of the "Company Visitors Management System" project. The root cause lies in the fact that attackers can inject malicious code via the parameter "username". This input is then directly utilized in SQL queries without undergoing proper sanitization or validation processes. As a result, attackers are able to fabricate input values, manipulate SQL queries, and execute unauthorized operations.
La source⚠️ https://github.com/f1rstb100d/CVE/issues/37
Utilisateur
 Anonymous User
Soumission04/04/2026 15:15 (il y a 22 jours)
Modérer12/04/2026 22:35 (8 days later)
StatutDupliqué
Entrée VulDB299966 [PHPGurukul Company Visitor Management System 2.0 Sign In /index.php Nom d'utilisateur injection SQL]
Points0

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!