| Título | code-projects EMPLOYEE RECORD SYSTEM 1.0 SQL Injection |
|---|
| Descripción | We can control the keyword parameter. The SQL statement has no protective measures, and we can perform Boolean blind injection by constructing a payload. |
|---|
| Fuente | ⚠️ https://github.com/872323857/CVE/blob/main/employee-record-system.md |
|---|
| Usuario | Thir0th (UID 84933) |
|---|
| Sumisión | 2025-05-04 17:13 (hace 12 meses) |
|---|
| Moderación | 2025-05-15 10:07 (11 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 309043 [code-projects Employee Record System 1.0 /dashboard/getData.php keywords inyección SQL] |
|---|
| Puntos | 15 |
|---|