[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Submit #471112: code-projects Chat System 1.0.0.00 SQL Injectioninformação

Titlecode-projects Chat System 1.0.0.00 SQL Injection
DescriptionIn the file 'update_user.php' located at /admin/update_user.php, there is a possibility of performing SQL injection on the 'name and id' parameter. This allows attackers to inject malicious SQL code into the query. For example, if the name and id parameter is set to: error-based: script=1' AND 4381=(SELECT (CASE WHEN (4381=4381) THEN 4381 ELSE (SELECT 6122 UNION SELECT 5924) END))-- -
Source⚠️ https://code-projects.org/chat-system-using-php-source-code/
User
 Havook (UID 71104)
Submission28/12/2024 16h18 (há 15 Dias)
Moderation29/12/2024 16h38 (1 day later)
StatusAceite
VulDB Entry289768 [code-projects Chat System 1.0 /admin/update_user.php id sql injection]
Points20

Interested in the pricing of exploits?

See the underground prices here!