提交 #436520: Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm V1.0 SQL Injection信息

标题Codezips Online Institute Management System In PHP MYSQL Secure Login Algorithm V1.0 SQL Injection
描述'Lime' found that the file upload operation was received by the variable '$_FILES' in the 'profile.php' file. Due to the lack of proper input validation and cleaning, remote attackers can pass malicious payloads through this file upload function, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE).Attackers can exploit this vulnerability for unrestricted uploads, which may result in file overwrite, file injection, directory traversal attacks, and denial of service attacks. Remote attacks may also lead to RCE
来源⚠️ https://github.com/hbuzs/CVE/issues/1
用户
 Lime (UID 77066)
提交2024-11-03 11時20分 (1 年前)
管理2024-11-04 10時48分 (23 hours later)
状态已接受
VulDB条目282952 [Codezips Online Institute Management System 直到 1.0 /profile.php old_image 权限提升]
积分20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!