| Titre | code-projects EMPLOYEE RECORD SYSTEM 1.0 SQL Injection |
|---|
| Description | We can control the keyword parameter. The SQL statement has no protective measures, and we can perform Boolean blind injection by constructing a payload. |
|---|
| La source | ⚠️ https://github.com/872323857/CVE/blob/main/employee-record-system.md |
|---|
| Utilisateur | Thir0th (UID 84933) |
|---|
| Soumission | 04/05/2025 17:13 (il y a 12 mois) |
|---|
| Modérer | 15/05/2025 10:07 (11 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 309043 [code-projects Employee Record System 1.0 /dashboard/getData.php keywords injection SQL] |
|---|
| Points | 15 |
|---|