| Title | code-projects Real Estate Property ManagementSystem v1.0 php SQL Injection |
|---|
| Description | In search.php. An unrestricted SOL injection attack exists in an Real Estate Property Management System. Theparameters that can be controlled are as follows: $stateName parameter . This function executesthe id parameter into the SOL statement without any restrictions. A malicious attacker couldexploit this vulnerability to obtain sensitive information in the server database. |
|---|
| Source | ⚠️ https://github.com/1337g/realestatepropertymanagement_poc/blob/main/sql-gu2.pdf |
|---|
| User | 1337gu (UID 80869) |
|---|
| Submission | 02/12/2025 18:13 (1 Year ago) |
|---|
| Moderation | 02/16/2025 15:17 (4 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 295983 [code-projects Real Estate Property Management System 1.0 /search.php StateName/CityName/AreaName/CatId sql injection] |
|---|
| Points | 20 |
|---|