Submit #302363: campcodes Complete Online Beauty Parlor Management System ≤1.0 SQL injectioninfo

Titlecampcodes Complete Online Beauty Parlor Management System ≤1.0 SQL injection
DescriptionSQL injection vulnerability exists in username parameter of /admin/index.php file of Complete Online Beauty Parlor Management System Important user data or system data may be leaked and system security may be compromised The environment is secure and the information can be used by malicious users. Payload:username=1'%20AND%20(SELECT%205086%20FROM%20(SELECT(SLEEP(13)))wfzY)%20AND%20'ZvsA'='ZvsA
Source⚠️ https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%201.pdf
User
 SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936)
Submission03/21/2024 10:44 (2 years ago)
Moderation03/21/2024 16:33 (6 hours later)
StatusAccepted
VulDB entry257602 [Campcodes Complete Online Beauty Parlor Management System 1.0 /admin/index.php Username sql injection]
Points19

Want to know what is going to be exploited?

We predict KEV entries!