Submit #800833: EMPLOYEE_MANAGEMENT_SYSTEM v1.0 SQL Injectioninfo

TitleEMPLOYEE_MANAGEMENT_SYSTEM v1.0 SQL Injection
Description## EMPLOYEE_MANAGEMENT_SYSTEM file `370project/edit.php` contains a SQL Injection (time-based blind) vulnerability Impact of the vulnerability Because user-controlled input is concatenated into an SQL statement without proper parameterization, an attacker may be able to: - Infer/extract data via blind techniques - Bypass intended query logic and access unauthorized records (depending on DB privileges) - Degrade service availability by triggering expensive/time-delay queries ### Payload: (select*from(select+sleep(10)union/**/select+1)a) ### **Sources download:** https://code-projects.org/employee-management-system-in-php-with-source-code/
Source⚠️ https://github.com/zzzxc643/CVE1/blob/main/EMPLOYEE_MANAGEMENT_SYSTEM/vul3.md
User
 SSL_Seven_Security_Lab_WangZhiQiang_ZhanXiuChen (UID 97200)
Submission04/09/2026 08:48 (19 days ago)
Moderation04/26/2026 18:01 (17 days later)
StatusAccepted
VulDB entry359714 [code-projects Employee Management System 1.0 370project/edit.php ID sql injection]
Points20

Do you know our Splunk app?

Download it now for free!