Súbít #586916: PHPGurukul Daily Expense Tracker System 1.1 SQL Injectionbayani

KuraPHPGurukul Daily Expense Tracker System 1.1 SQL Injection
GaskiyaA SQL injection vulnerability was identified within the "/expense-reports-detailed.php" file of the "Daily Expense Tracker System" project. The root cause lies in the fact that attackers can inject malicious code via the parameter "todate". This input is then directly utilized in SQL queries without undergoing proper sanitization or validation processes. As a result, attackers are able to fabricate input values, manipulate SQL queries, and execute unauthorized operations.
Manga⚠️ https://github.com/f1rstb100d/myCVE/issues/26
Màdùmga
 Anonymous User
Furta05/29/2025 18:56 (9 Wurɗi 전)
Gargajiya06/03/2025 18:36 (5 days later)
HalittaShingilam
VulDB gite310996 [PHPGurukul Daily Expense Tracker System 1.1 expense-reports-detailed.php fromdate/todate SQL Injection]
Nganji20

Do you want to use VulDB in your project?

Use the official API to access entries easily!