Submit #592112: code-projects Chat System Using PHP With Source Code 1.0 SQL Injectioninfo

Titlecode-projects Chat System Using PHP With Source Code 1.0 SQL Injection
DescriptionThe cid parameter in /user/confirm_password.php is not properly sanitized or parameterized, which leaves it vulnerable to SQL injection attacks. Attackers can exploit this by injecting malicious SQL code to manipulate the database queries. Utilizing time-based SQL injection methods, they can introduce intentional delays in the database response through functions such as SLEEP(). This technique can be employed to verify the existence of the vulnerability and may also be used to extract sensitive information from the database.
Source⚠️ https://github.com/LamentXU123/cve/blob/main/sql4.md
User
 LamentXU (UID 78142)
Submission06/06/2025 20:34 (11 months ago)
Moderation06/08/2025 21:27 (2 days later)
StatusAccepted
VulDB entry311639 [code-projects Chat System up to 1.0 confirm_password.php cid sql injection]
Points20

Might our Artificial Intelligence support you?

Check our Alexa App!