提交 #517963: Advocate office management system free download deactivate.php v1.0 SQL Injection信息

标题Advocate office management system free download deactivate.php v1.0 SQL Injection
描述The 76 line of the deactivate.php file uses the PHP method to retrieve user input from the GET element. Then, the value of this element is passed to the code without proper cleaning or validation, and ultimately used for database queries. This may lead to SQL injection attacks. baiyunjian has discovered that due to insufficient protection of the "id" parameter in the "deactivate.php" file, "Advocate office management system free download" there is a serious security vulnerability in the This vulnerability may be used to inject malicious SQL queries, resulting in unauthorized access and extraction of sensitive information from the database.
来源⚠️ https://github.com/Hefei-Coffee/cve/issues/12
用户
 bingbingliang (UID 82659)
提交2025-03-11 08時38分 (1 年前)
管理2025-03-21 14時18分 (10 days later)
状态已接受
VulDB条目300587 [SourceCodester Kortex Lite Advocate Office Management System 1.0 deactivate.php 标识符 SQL注入]
积分20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!