提出 #778588: GitHub advocate-office-management-system V 1.0 SQL Injection情報

タイトルGitHub advocate-office-management-system V 1.0 SQL Injection
説明The id parameter under the control/activate_reg.php file of the advertisement office management system is controllable by the user. This parameter does not carry out any filtering. An attacker can execute malicious sql injection by constructing malicious sql statements, thus creating an sql injection vulnerability. Through this vulnerability, sensitive information can be obtained, or malicious files can be written, and finally server permissions can be obtained
ソース⚠️ https://github.com/zhangbeihai-1/cve/issues/1
ユーザー
 dead_end (UID 96372)
送信2026年03月12日 11:03 (17 日 ago)
モデレーション2026年03月27日 17:07 (15 days later)
ステータス重複
VulDBエントリ300585 [SourceCodester Kortex Lite Advocate Office Management System 1.0 activate_reg.php 識別子 SQLインジェクション]
ポイント0

Do you know our Splunk app?

Download it now for free!