| Title | code-projects EMPLOYEE RECORD SYSTEM 1.0 SQL Injection |
|---|
| Description | We can control the keyword parameter. The SQL statement has no protective measures, and we can perform Boolean blind injection by constructing a payload. |
|---|
| Source | ⚠️ https://github.com/872323857/CVE/blob/main/employee-record-system.md |
|---|
| User | Thir0th (UID 84933) |
|---|
| Submission | 05/04/2025 17:13 (12 months ago) |
|---|
| Moderation | 05/15/2025 10:07 (11 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 309043 [code-projects Employee Record System 1.0 /dashboard/getData.php keywords sql injection] |
|---|
| Points | 15 |
|---|