| Title | kashipara Dynamic Lab Management System ≤1.0 SQL injection |
|---|
| Description | SQL injection vulnerability exists in password parameter of login_process.php file of Dynamic Lab Management System
Important user data or system data may be leaked and system security may be compromised
The environment is secure and the information can be used by malicious users.
Payload: password=0' AND (SELECT 4484 FROM (SELECT(SLEEP(5)))uNIW) AND 'oIyo'='oIyo&username=1 |
|---|
| Source | ⚠️ https://github.com/VistaAX/vulnerablility/blob/main/Dynamic%20Lab%20Management%20System%20-%20vuln%202.pdf |
|---|
| User | Vista_AX (UID 60969) |
|---|
| Submission | 01/05/2024 08:29 (2 years ago) |
|---|
| Moderation | 01/07/2024 21:07 (3 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 249874 [Kashipara Dynamic Lab Management System up to 1.0 login_process.php Password sql injection] |
|---|
| Points | 20 |
|---|