提交 #373488: SourceCodester Kortex Advocate office Management System (add_act.php) 1.0 Time based SQL injection信息

标题SourceCodester Kortex Advocate office Management System (add_act.php) 1.0 Time based SQL injection
描述Related Code file: /control/add_act_.php Injection parameter: MULTIPART aname POST parameter 'MULTIPART aname' is vulnerable. sqlmap finding: ``` Parameter: MULTIPART aname ((custom) POST) Type: boolean-based blind Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: -----------------------------8879615583215427378340903645 Content-Disposition: form-data; name="aname" ``` Report link: https://reports-kunull.vercel.app/sourcecodester-advocate-management-system-add-act
来源⚠️ https://www.sourcecodester.com/php/17280/advocate-office-management-system-free-download.html
用户
 Anonymous User
提交2024-07-12 15時37分 (2 年前)
管理2024-07-13 07時33分 (16 hours later)
状态已接受
VulDB条目271402 [SourceCodester Kortex Lite Advocate Office Management System 1.0 /control/add_act.php aname SQL注入]
积分20

Interested in the pricing of exploits?

See the underground prices here!