| Kura | sourcecodester Survey Application System 1.0 SQL Injection |
|---|
| Gaskiya | The application constructs SQL by concatenating user-supplied POST values into the $data string then interpolates that into an UPDATE statement. Identifiers and values are not parameterized. Escaping (escapeString()) is used in places but interpolation remains. This allows an attacker to alter SQL logic by injecting SQL syntax into fullname (or any POST field concatenated into $data). |
|---|
| Manga | ⚠️ https://github.com/lakshayyverma/CVE-Discovery/blob/main/Survey%20Application%20System.md |
|---|
| Màdùmga | lakshay12311 (UID 91298) |
|---|
| Furta | 10/24/2025 13:54 (4 Wurɗi 전) |
|---|
| Gargajiya | 11/09/2025 14:02 (16 days later) |
|---|
| Halitta | Shingilam |
|---|
| VulDB gite | 331649 [SourceCodester Survey Application System 1.0 /LoginRegistration.php save_user/update_user fullname SQL Injection] |
|---|
| Nganji | 20 |
|---|