| Titre | EMPLOYEE_MANAGEMENT_SYSTEM v1.0 SQL Injection |
|---|
| Description | ## EMPLOYEE_MANAGEMENT_SYSTEM file `370project/delete.php` contains a SQL Injection (time-based blind) vulnerability
Impact of the vulnerability
The `id` parameter is taken directly from the URL and concatenated into a `DELETE` SQL statement without parameterization. An attacker may be able to:
- Manipulate database queries (unauthorized data modification/deletion, depending on DB permissions)
- Infer database behavior/data using blind techniques
- Degrade availability by forcing expensive/time-delay database operations
### Payload:
(select*from(select+sleep(10)union/**/select+1)a)
### Sources download:
https://code-projects.org/employee-management-system-in-php-with-source-code/ |
|---|
| La source | ⚠️ https://github.com/zzzxc643/CVE1/blob/main/EMPLOYEE_MANAGEMENT_SYSTEM/vul5.md |
|---|
| Utilisateur | SSL_Seven_Security_Lab_WangZhiQiang_ZhanXiuChen (UID 97200) |
|---|
| Soumission | 09/04/2026 08:50 (il y a 19 jours) |
|---|
| Modérer | 26/04/2026 18:01 (17 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 359715 [code-projects Employee Management System 1.0 370project/delete.php ID injection SQL] |
|---|
| Points | 20 |
|---|