| 标题 | code-projects Simple Gym Management System 1.0 SQL Injection |
|---|
| 描述 | The payment functionality directly concatenates Payment_id, Amount, customer_id, payment_type, and customer_name into the INSERT statement without any filtering. An attacker could manipulate payment data, resulting in financial loss.
Impact: An attacker could manipulate payment data to alter amounts, forge payment records, cause financial loss, or even obtain all payment information. |
|---|
| 来源 | ⚠️ https://github.com/maidangdang1/CVE/issues/5 |
|---|
| 用户 | nomath (UID 96446) |
|---|
| 提交 | 2026-03-15 11時05分 (19 日前) |
|---|
| 管理 | 2026-03-31 10時52分 (16 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 354336 [code-projects Simple Gym Management System 1.0 Payment SQL注入] |
|---|
| 积分 | 20 |
|---|