ଜମା କରନ୍ତୁ #470304: Event Management System V1.0 sqlସୂଚନା

ଶୀର୍ଷକEvent Management System V1.0 sql
ବର୍ଣ୍ଣନାA critical SQL injection vulnerability has been identified in the Event Management System In PHP With Source Code (v1.0). Attackers can exploit the title parameter within /contact.php to inject malicious SQL code, potentially gaining full access to the underlying database. Immediate remediation is strongly advised. Insufficient user input validation of the title parameter allows direct injection of malicious payloads into SQL queries. Potential Consequences Unauthorized Database Access: Attackers may read or modify protected information. Data Leakage: Sensitive records (e.g., customer info) can be exposed. Data Tampering: Malicious actors can create, update, or delete records. Operational Disruption: System downtime or service interruption.
ଉତ୍ସ⚠️ https://github.com/T3rm1n4L-LYC/Vuldb/blob/main/SQL_Injection_in_Event_Management_System.md
ଉପଭୋକ୍ତା
 T3rm1n4L (UID 79535)
ଦାଖଲ12/27/2024 05:53 PM (1 ବର୍ଷ ago)
ମଧ୍ୟମ ଧରଣର12/28/2024 10:02 AM (16 hours later)
ସ୍ଥିତିଗ୍ରହଣ କରାଯାଇଛି
VulDB ଏଣ୍ଟ୍ରି289668 [Codezips Event Management System 1.0 /contact.php ଶୀର୍ଷକ SQL ଇଞ୍ଜେକ୍ସନ]
ପଏଣ୍ଟ20

Do you want to use VulDB in your project?

Use the official API to access entries easily!