Submeter #778588: GitHub advocate-office-management-system V 1.0 SQL Injectioninformação

TítuloGitHub advocate-office-management-system V 1.0 SQL Injection
DescriçãoThe id parameter under the control/activate_reg.php file of the advertisement office management system is controllable by the user. This parameter does not carry out any filtering. An attacker can execute malicious sql injection by constructing malicious sql statements, thus creating an sql injection vulnerability. Through this vulnerability, sensitive information can be obtained, or malicious files can be written, and finally server permissions can be obtained
Fonte⚠️ https://github.com/zhangbeihai-1/cve/issues/1
Utilizador
 dead_end (UID 96372)
Submissão12/03/2026 11h03 (há 17 dias)
Moderação27/03/2026 17h07 (15 days later)
EstadoDuplicado
Entrada VulDB300585 [SourceCodester Kortex Lite Advocate Office Management System 1.0 activate_reg.php ID Injeção SQL]
Pontos0

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!