Submeter #473143: Code-projects Chat System 1.0 SQL Injectioninformação

TitleCode-projects Chat System 1.0 SQL Injection
DescriptionBecause the id parameter is not sanitized or parameterized, an attacker can inject malicious SQL code to manipulate the database query. By leveraging time-based SQL injection techniques, an attacker can induce deliberate delays in the database response using functions like SLEEP(). This can be used to confirm the presence of the vulnerability and potentially extract sensitive information from the database.
Source⚠️ https://github.com/Sinon2003/cve/blob/main/sql_inject1.md
User
 Rorochan (UID 79656)
Submission01/01/2025 09h35 (há 3 meses)
Moderation02/01/2025 09h32 (24 hours later)
StatusAceite
VulDB Entry289938 [code-projects Chat System 1.0 /admin/deleteuser.php ID Injecção SQL]
Points20

Do you know our Splunk app?

Download it now for free!