| Title | https://code-projects.org/ Matrimonial Site In PHP With Source Code 1.0 Sqlinjection |
|---|
| Description | A SQL injection vulnerability exists in the Matrimonial Site System Auth has Sqlinjection The basic introduction of the vulnerability is that SQL injection means that the web application does not strictly judge or filter the validity of user input data. An attacker can add additional SQL statements to the end of a predefined query statement in a web application, and perform illegal operations without the knowledge of the administrator. In this way, the database server can be tricked into performing any unauthorized query and obtaining the corresponding data information.
Source DownLoad:https://code-projects.org/matrimonial-site-in-php-with-source-code/
|
|---|
| Source | ⚠️ https://github.com/850362564/BugHub/blob/main/Matrimonial%20Site%20System%20auth.php%20has%20Sqlinjection.pdf |
|---|
| User | LiHui (UID 59707) |
|---|
| Submission | 12/06/2023 13:15 (2 years ago) |
|---|
| Moderation | 12/09/2023 18:27 (3 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 247344 [code-projects Matrimonial Site 1.0 /auth/auth.php?user=1 Username sql injection] |
|---|
| Points | 20 |
|---|