提交 #262680: kashipara Dynamic Lab Management System ≤1.0 SQL injection信息

标题kashipara Dynamic Lab Management System ≤1.0 SQL injection
描述SQL injection vulnerability exists in password parameter of login_process.php file of Dynamic Lab Management System Important user data or system data may be leaked and system security may be compromised The environment is secure and the information can be used by malicious users. Payload: password=0' AND (SELECT 4484 FROM (SELECT(SLEEP(5)))uNIW) AND 'oIyo'='oIyo&username=1
来源⚠️ https://github.com/VistaAX/vulnerablility/blob/main/Dynamic%20Lab%20Management%20System%20-%20vuln%202.pdf
用户
 Vista_AX (UID 60969)
提交2024-01-05 08時29分 (2 年前)
管理2024-01-07 21時07分 (3 days later)
状态已接受
VulDB条目249874 [Kashipara Dynamic Lab Management System 直到 1.0 login_process.php 密码 SQL注入]
积分20

Do you want to use VulDB in your project?

Use the official API to access entries easily!