| 标题 | code-projects Real Estate Property Management System 0/1 php SQL Injection |
|---|
| 描述 | An unrestricted SQL injection attack exists in an Real Estate Property Management System. The parameters that can be controlled are as follows: $Email parameter . This function executes the id parameter into the SQL statement without any restrictions. A malicious attacker could exploit this vulnerability to obtain sensitive information in the server database.
|
|---|
| 来源 | ⚠️ https://github.com/yiijiayan/cve/blob/main/sql-cve.md |
|---|
| 用户 | yijiayan (UID 82471) |
|---|
| 提交 | 2025-03-07 16時01分 (1 年前) |
|---|
| 管理 | 2025-03-16 18時05分 (9 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 299883 [code-projects Real Estate Property Management System 1.0 Parameter /InsertCustomer.php SQL注入] |
|---|
| 积分 | 19 |
|---|