| Название | code-projects Online Examination System 1 SQL Injection |
|---|
| Описание | SQL Injection on Login Page.
The insecure usage of "mysql_*", which is deprecated, is used across the project. Here's a sample endpoint where an sqli gets you logged into the admin account (muler, by default):
/onexam/index.php
|
|---|
| Источник | ⚠️ https://github.com/geo-chen/code-projects/blob/main/Online%20Examination%20System%20In%20PHP%20With%20Source%20Code.md#finding-2-sql-injection-on-login-page |
|---|
| Пользователь | geochen (UID 78995) |
|---|
| Представление | 12.01.2026 17:23 (3 месяцы назад) |
|---|
| Модерация | 25.01.2026 18:07 (13 days later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 342838 [code-projects Online Examination System 1.0 Login Page /index.php Пользователь SQL-инъекция] |
|---|
| Баллы | 17 |
|---|