提出 #780406: code-projects Simple Gym Management System 1.0 SQL Injection情報

タイトルcode-projects Simple Gym Management System 1.0 SQL Injection
説明The payment functionality directly concatenates Payment_id, Amount, customer_id, payment_type, and customer_name into the INSERT statement without any filtering. An attacker could manipulate payment data, resulting in financial loss. Impact: An attacker could manipulate payment data to alter amounts, forge payment records, cause financial loss, or even obtain all payment information.
ソース⚠️ https://github.com/maidangdang1/CVE/issues/5
ユーザー
 nomath (UID 96446)
送信2026年03月15日 11:05 (19 日 ago)
モデレーション2026年03月31日 10:52 (16 days later)
ステータス承諾済み
VulDBエントリ354336 [code-projects Simple Gym Management System 1.0 Payment SQLインジェクション]
ポイント20

Want to know what is going to be exploited?

We predict KEV entries!