提交 #780406: code-projects Simple Gym Management System 1.0 SQL Injection信息

标题code-projects Simple Gym Management System 1.0 SQL Injection
描述The payment functionality directly concatenates Payment_id, Amount, customer_id, payment_type, and customer_name into the INSERT statement without any filtering. An attacker could manipulate payment data, resulting in financial loss. Impact: An attacker could manipulate payment data to alter amounts, forge payment records, cause financial loss, or even obtain all payment information.
来源⚠️ https://github.com/maidangdang1/CVE/issues/5
用户
 nomath (UID 96446)
提交2026-03-15 11時05分 (19 日前)
管理2026-03-31 10時52分 (16 days later)
状态已接受
VulDB条目354336 [code-projects Simple Gym Management System 1.0 Payment SQL注入]
积分20

Interested in the pricing of exploits?

See the underground prices here!