ଜମା କରନ୍ତୁ #471113: code-projects Chat System 1.0.0.0 SQL Injectionସୂଚନା

ଶୀର୍ଷକcode-projects Chat System 1.0.0.0 SQL Injection
ବର୍ଣ୍ଣନାThe SQL Injection vulnerability exists in diretory '/admin/update_room.php?id=1' because the 'id', 'name' and 'password' parameters is directly inserted into the SQL queries without any validation or sanitization. If an attacker inputs malicious SQL code as the 'id', 'name' and 'password' parameters, it will be executed by the database. For example, if the 'id' parameter is set to "id=1' AND (SELECT 8224 FROM (SELECT(SLEEP(5)))riQp)-- RGaL", it could manipulate the query to return or modify unintended data. Always use prepared statements or parameterized queries to prevent this. script: id=2' AND (SELECT 5271 FROM (SELECT(SLEEP(5)))LiHR)-- oRQe
ଉତ୍ସ⚠️ https://code-projects.org/chat-system-using-php-source-code/
ଉପଭୋକ୍ତା
 Fergod (UID 55882)
ଦାଖଲ12/28/2024 04:20 PM (1 ବର୍ଷ ago)
ମଧ୍ୟମ ଧରଣର12/29/2024 04:38 PM (1 day later)
ସ୍ଥିତିଗ୍ରହଣ କରାଯାଇଛି
VulDB ଏଣ୍ଟ୍ରି289769 [code-projects Chat System 1.0 /admin/update_room.php id/name/password SQL ଇଞ୍ଜେକ୍ସନ]
ପଏଣ୍ଟ20

Do you want to use VulDB in your project?

Use the official API to access entries easily!