| タイトル | PHPGurukul Pre-School Enrollment System 1.0 SQL Injection |
|---|
| 説明 | A SQL injection vulnerability was identified within the "/enrollment.php" file of the "Pre-School Enrollment System" project. The root cause lies in the fact that attackers can inject malicious code via the parameter "fathername". This input is then directly utilized in SQL queries without undergoing proper sanitization or validation processes. As a result, attackers are able to fabricate input values, manipulate SQL queries, and execute unauthorized operations. |
|---|
| ソース | ⚠️ https://github.com/f1rstb100d/myCVE/issues/76 |
|---|
| ユーザー | Anonymous User |
|---|
| 送信 | 2025年06月13日 04:11 (10 月 ago) |
|---|
| モデレーション | 2025年06月19日 12:03 (6 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 313323 [PHPGurukul Pre-School Enrollment System 1.0 /enrollment.php fathername SQLインジェクション] |
|---|
| ポイント | 20 |
|---|