제출 #335200: code-projects Simple Chat App 1.0 SQL Injection정보

제목code-projects Simple Chat App 1.0 SQL Injection
설명Simple Chat App 1.0 allows SQL Injection via the 'name' , 'number' and 'address' parameters at "http://localhost/chat_project/register.php/" Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit the latest vulnerabilities in the underlying database.
원천⚠️ https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%202.md
사용자
 Burak (UID 65788)
제출2024. 05. 15. AM 04:03 (2 연령 ago)
모더레이션2024. 05. 15. PM 10:02 (18 hours later)
상태수락
VulDB 항목264538 [code-projects Simple Chat System 1.0 /register.php name/number/address SQL 주입]
포인트들18

Do you want to use VulDB in your project?

Use the official API to access entries easily!