Gửi #800855: EMPLOYEE_MANAGEMENT_SYSTEM v1.0 SQL Injectionthông tin

tiêu đềEMPLOYEE_MANAGEMENT_SYSTEM v1.0 SQL Injection
Mô tả## EMPLOYEE_MANAGEMENT_SYSTEM file `370project/approve.php` contains a SQL Injection (time-based blind) vulnerability Impact of the vulnerability The application directly concatenates user-supplied parameters into an SQL `UPDATE` statement without parameterization. An attacker may be able to: - Manipulate the approval logic (unauthorized status changes, depending on DB behavior/permissions) - Infer database behavior/data using blind techniques - Cause performance degradation by triggering time-delay or expensive database operations ### Payload: (select*from(select+sleep(5)union/**/select+1)a) ### Sources download: https://code-projects.org/employee-management-system-in-php-with-source-code/
Nguồn⚠️ https://github.com/zzzxc643/CVE1/blob/main/EMPLOYEE_MANAGEMENT_SYSTEM/vul9.md
Người dùng
 SSL_Seven_Security_Lab_WangZhiQiang_ZhanXiuChen (UID 97200)
Đệ trình09/04/2026 10:15 (cách đây 19 ngày)
Kiểm duyệt26/04/2026 18:02 (17 days later)
Trạng tháiđược chấp nhận
Mục VulDB359717 [code-projects Employee Management System 1.0 370project/approve.php id/token Tiêm SQL]
điểm20

Do you want to use VulDB in your project?

Use the official API to access entries easily!