[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Submit #339813: Campcodes Complete Web-Based School Management System ≤1.0 SQL InjectionИнформация

TitleCampcodes Complete Web-Based School Management System ≤1.0 SQL Injection
DescriptionSQL injection vulnerability exists in grade parameter of /view/timetable_grade_wise.php file of Complete Web-Based School Management System Important user data or system data may be leaked and system security may be compromised The environment is secure and the information can be used by malicious users. Payload: grade='%2B(select(0)from(select(sleep(12)))v)%2B' Source Download: https://www.campcodes.com/projects/php/web-based-school-management-system/
Source⚠️ https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2027.pdf
User
 SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936)
Submission20.05.2024 16:25 (8 месяцы назад)
Moderation22.05.2024 22:32 (2 days later)
Statusпринято
VulDB Entry265988 [Campcodes Complete Web-Based School Management System 1.0 timetable_grade_wise.php grade sql injection]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!