| Title | code-projects Real Estate Property Management System 0/1 php SQL Injection |
|---|
| Description | An unrestricted SQL injection attack exists in an Real Estate Property Management System. The parameters that can be controlled are as follows: $Email parameter . This function executes the id parameter into the SQL statement without any restrictions. A malicious attacker could exploit this vulnerability to obtain sensitive information in the server database.
|
|---|
| Source | ⚠️ https://github.com/yiijiayan/cve/blob/main/sql-cve.md |
|---|
| User | yijiayan (UID 82471) |
|---|
| Submission | 03/07/2025 16:01 (1 Year ago) |
|---|
| Moderation | 03/16/2025 18:05 (9 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 299883 [code-projects Real Estate Property Management System 1.0 Parameter /InsertCustomer.php sql injection] |
|---|
| Points | 19 |
|---|