जमा करें #571306: PHPGurukul Beauty Parlour Management System V1.1 SQL Injectionजानकारी

शीर्षकPHPGurukul Beauty Parlour Management System V1.1 SQL Injection
विवरणDuring the security assessment of "Beauty Parlour Management System", I detected a critical SQL injection vulnerability in the "/bpms/contact.php" file. This vulnerability is attributed to the insufficient validation of user input for the "fname" parameter. This inadequacy enables attackers to inject malicious SQL queries. Consequently, attackers can access the database without proper authorization, modify or delete data, and obtain sensitive information. Immediate corrective actions are essential to safeguard system security and uphold data integrity.
स्रोत⚠️ https://github.com/xinxinwang99/CVE/issues/2
उपयोगकर्ता
 xinxinw (UID 84930)
सबमिशन05/05/2025 11:53 AM (11 महीनों पहले)
संयम15/05/2025 11:12 AM (10 days later)
स्थितिस्वीकृत
VulDB प्रविष्टि309060 [PHPGurukul Beauty Parlour Management System 1.1 /contact.php fname SQL इंजेक्शन]
अंक20

Do you want to use VulDB in your project?

Use the official API to access entries easily!