| タイトル | PHPGurukul Company Visitors Management System 2.0 SQL Injection |
|---|
| 説明 | A SQL injection vulnerability was identified within the "/index.php" file of the "Company Visitors Management System" project. The root cause lies in the fact that attackers can inject malicious code via the parameter "username". This input is then directly utilized in SQL queries without undergoing proper sanitization or validation processes. As a result, attackers are able to fabricate input values, manipulate SQL queries, and execute unauthorized operations. |
|---|
| ソース | ⚠️ https://github.com/f1rstb100d/CVE/issues/37 |
|---|
| ユーザー | Anonymous User |
|---|
| 送信 | 2026年04月04日 15:15 (24 日 ago) |
|---|
| モデレーション | 2026年04月12日 22:35 (8 days later) |
|---|
| ステータス | 重複 |
|---|
| VulDBエントリ | 299966 [PHPGurukul Company Visitor Management System 2.0 Sign In /index.php ユーザー名 SQLインジェクション] |
|---|
| ポイント | 0 |
|---|