제출 #592112: code-projects Chat System Using PHP With Source Code 1.0 SQL Injection정보

제목code-projects Chat System Using PHP With Source Code 1.0 SQL Injection
설명The cid parameter in /user/confirm_password.php is not properly sanitized or parameterized, which leaves it vulnerable to SQL injection attacks. Attackers can exploit this by injecting malicious SQL code to manipulate the database queries. Utilizing time-based SQL injection methods, they can introduce intentional delays in the database response through functions such as SLEEP(). This technique can be employed to verify the existence of the vulnerability and may also be used to extract sensitive information from the database.
원천⚠️ https://github.com/LamentXU123/cve/blob/main/sql4.md
사용자
 LamentXU (UID 78142)
제출2025. 06. 06. PM 08:34 (11 개월 ago)
모더레이션2025. 06. 08. PM 09:27 (2 days later)
상태수락
VulDB 항목311639 [code-projects Chat System 까지 1.0 confirm_password.php cid SQL 주입]
포인트들20

Do you want to use VulDB in your project?

Use the official API to access entries easily!