### [CVE-2021-41931](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41931) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description The Company's Recruitment Management System in id=2 of the parameter from view_vacancy app on-page appears to be vulnerable to SQL injection. The payloads 19424269' or '1309'='1309 and 39476597' or '2917'='2923 were each submitted in the id parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way. ### POC #### Reference - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-20-100121 #### Github - https://github.com/2lambda123/CVE-mitre - https://github.com/ARPSyndicate/cvemon - https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame - https://github.com/nu11secur1ty/CVE-mitre