Title | code-projects Job-recruitment-in-php v1.0 Sql injection |
---|
Description | An unrestricted SQL injection attack exists in a job-recruitment-system. The parameters that can be controlled are as follows: $userhash parameter in /\_parse/load\_user-profile.php . This function executes the urle parameter into the SQL statement without any restrictions. A malicious attacker could exploit this vulnerability to obtain sensitive information in the server database. |
---|
Source | ⚠️ https://github.com/1337g/CVE-2025-X/blob/main/job-recruitment_call_job_search_ajax-sqli.pdf |
---|
User | 1337gu (UID 80869) |
---|
Submission | 01/30/2025 05:06 AM (3 months ago) |
---|
Moderation | 01/31/2025 10:59 AM (1 day later) |
---|
Status | Accepted |
---|
VulDB Entry | 294243 [code-projects Job Recruitment 1.0 _call_job_search_ajax.php n sql injection] |
---|
Points | 20 |
---|