| ଶୀର୍ଷକ | Code-Projects Simple Stock System V1.0 SQL Injection |
|---|
| ବର୍ଣ୍ଣନା | A SQL injection vulnerability was identified within the "login.php" file of the "Simple Stock System" project. The root cause lies in the fact that attackers can inject malicious code via the parameter "username". This input is then directly utilized in SQL queries without undergoing proper sanitization or validation processes. As a result, attackers are able to fabricate input values, manipulate SQL queries, and execute unauthorized operations. Immediate corrective actions are essential to safeguard system security and uphold data integrity. |
|---|
| ଉତ୍ସ | ⚠️ https://github.com/c13641462064-lgtm/sql_injection/issues/1 |
|---|
| ଉପଭୋକ୍ତା | C13641462064 (UID 93897) |
|---|
| ଦାଖଲ | 12/29/2025 06:42 AM (2 ମାସ[ସମ୍ପାଦନା] ago) |
|---|
| ମଧ୍ୟମ ଧରଣର | 12/29/2025 09:18 AM (3 hours later) |
|---|
| ସ୍ଥିତି | ଗ୍ରହଣ କରାଯାଇଛି |
|---|
| VulDB ଏଣ୍ଟ୍ରି | 338633 [code-projects Simple Stock System 1.0 /market/login.php ଉପଭୋକ୍ତାଙ୍କ ନାମ SQL ଇଞ୍ଜେକ୍ସନ] |
|---|
| ପଏଣ୍ଟ | 20 |
|---|