漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Multiple SQL injection vulnerabilities in ChurchInfo allow remote attackers to execute arbitrary SQL commands via the PersonID parameter to (1) PersonView.php, (2) MemberRoleChange.php, (3) PropertyAssign.php, (4) WhyCameEditor.php, (5) GroupPropsEditor.php, (6) Reports/PDFLabel.php, or (7) UserDelete.php, (8) DepositSlipID parameter to DepositSlipEditor.php, (9) QueryID parameter to QueryView.php, GroupID parameter to (10) GroupView.php, (11) GroupMemberList.php, (12) MemberRoleChange.php, (13) GroupDelete.php, (14) /Reports/ClassAttendance.php, or (15) /Reports/GroupReport.php, (16) PropertyID parameter to PropertyEditor.php, FamilyID parameter to (17) Canvas05Editor.php, (18) CanvasEditor.php, or (19) FamilyView.php, or (20) PledgeID parameter to PledgeDetails.php.
漏洞信息
N/A
漏洞
N/A
漏洞
ChurchInfo 多个SQL注入漏洞
漏洞信息
ChurchInfo存在多个SQL注入漏洞。这使得远程攻击者可以借助于提交到(1) PersonView.php、(2) MemberRoleChange.php、(3) PropertyAssign.php、(4) WhyCameEditor.php、(5) GroupPropsEditor.php、(6) Reports/PDFLabel.php或(7) UserDelete.php中的PersonID参数,提交到(8)DepositSlipEditor.php的DepositSlipID参数, 提交
漏洞信息
N/A
漏洞
N/A