제출 #800835: EMPLOYEE_MANAGEMENT_SYSTEM v1.0 SQL Injection정보

제목EMPLOYEE_MANAGEMENT_SYSTEM v1.0 SQL Injection
설명## EMPLOYEE_MANAGEMENT_SYSTEM file `370project/delete.php` contains a SQL Injection (time-based blind) vulnerability Impact of the vulnerability The `id` parameter is taken directly from the URL and concatenated into a `DELETE` SQL statement without parameterization. An attacker may be able to: - Manipulate database queries (unauthorized data modification/deletion, depending on DB permissions) - Infer database behavior/data using blind techniques - Degrade availability by forcing expensive/time-delay database operations ### Payload: (select*from(select+sleep(10)union/**/select+1)a) ### Sources download: https://code-projects.org/employee-management-system-in-php-with-source-code/
원천⚠️ https://github.com/zzzxc643/CVE1/blob/main/EMPLOYEE_MANAGEMENT_SYSTEM/vul5.md
사용자
 SSL_Seven_Security_Lab_WangZhiQiang_ZhanXiuChen (UID 97200)
제출2026. 04. 09. AM 08:50 (19 날 ago)
모더레이션2026. 04. 26. PM 06:01 (17 days later)
상태수락
VulDB 항목359715 [code-projects Employee Management System 1.0 370project/delete.php 아이디 SQL 주입]
포인트들20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!