提交 #778588: GitHub advocate-office-management-system V 1.0 SQL Injection信息

标题GitHub advocate-office-management-system V 1.0 SQL Injection
描述The id parameter under the control/activate_reg.php file of the advertisement office management system is controllable by the user. This parameter does not carry out any filtering. An attacker can execute malicious sql injection by constructing malicious sql statements, thus creating an sql injection vulnerability. Through this vulnerability, sensitive information can be obtained, or malicious files can be written, and finally server permissions can be obtained
来源⚠️ https://github.com/zhangbeihai-1/cve/issues/1
用户
 dead_end (UID 96372)
提交2026-03-12 11時03分 (17 日前)
管理2026-03-27 17時07分 (15 days later)
状态重复
VulDB条目300585 [SourceCodester Kortex Lite Advocate Office Management System 1.0 activate_reg.php 标识符 SQL注入]
积分0

Do you know our Splunk app?

Download it now for free!