| 标题 | PHPGurukul Zoo Management System 2.1 SQL Injection |
|---|
| 描述 | A SQL injection vulnerability was identified within the "/admin/manage-normal-ticket.php" file of the "Zoo Management System" project. The root cause lies in the fact that attackers can inject malicious code via the parameter "id". This input is then directly utilized in SQL queries without undergoing proper sanitization or validation processes. As a result, attackers are able to fabricate input values, manipulate SQL queries, and execute unauthorized operations. |
|---|
| 来源 | ⚠️ https://github.com/f1rstb100d/myCVE/issues/101 |
|---|
| 用户 | Anonymous User |
|---|
| 提交 | 2025-06-29 19時12分 (10 月前) |
|---|
| 管理 | 2025-07-07 08時55分 (8 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 315097 [PHPGurukul Zoo Management System 2.1 manage-normal-ticket.php 标识符 SQL注入] |
|---|
| 积分 | 20 |
|---|