提出 #262671: kashipara Dynamic Lab Management System ≤1.0 SQL injection情報

タイトルkashipara Dynamic Lab Management System ≤1.0 SQL injection
説明SQL injection vulnerability exists in admin_password parameter of /admin/admin_login_process.php file of Dynamic Lab Management System Important user data or system data may be leaked and system security may be compromised The environment is secure and the information can be used by malicious users. Payload: admin_password=0' AND (SELECT 9477 FROM (SELECT(SLEEP(5)))TMtz) AND 'NwGl'='NwGl&admin_username=1
ソース⚠️ https://github.com/E1CHO/cve_hub/blob/main/Dynamic%20Lab%20Management%20System%20-%20vuln%201.pdf
ユーザー
 SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936)
送信2024年01月05日 07:32 (2 年 ago)
モデレーション2024年01月07日 21:07 (3 days later)
ステータス承諾済み
VulDBエントリ249873 [Kashipara Dynamic Lab Management System 迄 1.0 admin_login_process.php admin_password SQLインジェクション]
ポイント20

Want to know what is going to be exploited?

We predict KEV entries!