Submit #800857: EMPLOYEE_MANAGEMENT_SYSTEM v1.0 SQL Injectioninfo

TitelEMPLOYEE_MANAGEMENT_SYSTEM v1.0 SQL Injection
Beschreibung## EMPLOYEE_MANAGEMENT_SYSTEM file `370project/cancel.php` contains a SQL Injection (time-based blind) vulnerability Impact of the vulnerability User-controlled parameters are concatenated into an SQL `UPDATE` statement without parameterization. This may allow an attacker to: - Manipulate leave-request status (unauthorized cancellation, depending on DB behavior/permissions) - Infer database behavior/data via blind techniques - Degrade availability by triggering time-delay or expensive database operations ### Payload: (select*from(select+sleep(10)union/**/select+1)a) ### Sources download: https://code-projects.org/employee-management-system-in-php-with-source-code/
Quelle⚠️ https://github.com/zzzxc643/CVE1/blob/main/EMPLOYEE_MANAGEMENT_SYSTEM/vul11.md
Benutzer
 SSL_Seven_Security_Lab_WangZhiQiang_ZhanXiuChen (UID 97200)
Einreichung09.04.2026 10:17 (vor 19 Tagen)
Moderieren26.04.2026 18:02 (17 days later)
StatusAkzeptiert
VulDB Eintrag359718 [code-projects Employee Management System 1.0 370project/cancel.php id/token SQL Injection]
Punkte20

Do you want to use VulDB in your project?

Use the official API to access entries easily!