提出 #632395: PHPGurukul User Management System in PHP using Stored Procedure v1.0 SQL Injection情報

タイトルPHPGurukul User Management System in PHP using Stored Procedure v1.0 SQL Injection
説明A SQL injection vulnerability was found in the '/signup.php' User Management System in PHP using Stored Procedure ' project. The reason for this issue is that attackers inject malicious code from the parameter 'emailid' and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
ソース⚠️ https://github.com/chenjunjie3/cve/issues/5
ユーザー
 chenjunjie (UID 88914)
送信2025年08月12日 11:07 (9 月 ago)
モデレーション2025年08月21日 07:30 (9 days later)
ステータス承諾済み
VulDBエントリ320907 [PHPGurukul User Management System 1.0 /signup.php emailid SQLインジェクション]
ポイント20

Do you want to use VulDB in your project?

Use the official API to access entries easily!