Invia #303671: campcodes House Rental Management System ≤1.0 SQL injectioninformazioni

Titlecampcodes House Rental Management System ≤1.0 SQL injection
DescriptionSQL injection vulnerability exists in username parameter of ajax.php file of House Rental Management System Important user data or system data may be leaked and system security may be compromised The environment is secure and the information can be used by malicious users. Payload:username=1'+AND+(SELECT+1234+FROM+(SELECT(SLEEP(13)))Iuab)+AND+'1'='1
Source⚠️ https://github.com/E1CHO/cve_hub/blob/main/House%20Rental%20Management%20System%20-%20vuln%201.pdf
User
 SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936)
Submission24/03/2024 05:52 (1 Anno fa)
Moderation26/03/2024 15:15 (2 days later)
StatusAccettato
VulDB Entry257982 [Campcodes House Rental Management System 1.0 ajax.php Nome utente sql injection]
Points18

Do you know our Splunk app?

Download it now for free!