Súbít #681746: sourcecodester Survey Application System 1.0 SQL Injectionbayani

Kurasourcecodester Survey Application System 1.0 SQL Injection
GaskiyaThe application constructs SQL by concatenating user-supplied POST values into the $data string then interpolates that into an UPDATE statement. Identifiers and values are not parameterized. Escaping (escapeString()) is used in places but interpolation remains. This allows an attacker to alter SQL logic by injecting SQL syntax into fullname (or any POST field concatenated into $data).
Manga⚠️ https://github.com/lakshayyverma/CVE-Discovery/blob/main/Survey%20Application%20System.md
Màdùmga
 lakshay12311 (UID 91298)
Furta10/24/2025 13:54 (4 Wurɗi 전)
Gargajiya11/09/2025 14:02 (16 days later)
HalittaShingilam
VulDB gite331649 [SourceCodester Survey Application System 1.0 /LoginRegistration.php save_user/update_user fullname SQL Injection]
Nganji20

Interested in the pricing of exploits?

See the underground prices here!