vendor:
                    Simple Student Attendance System
                by:
                    Gnanaraj Mauviel
                6.1
                        CVSS
                    HIGH
                    Time Based Blind SQL Injection
                    89
                        CWE
                    Product Name: Simple Student Attendance System
                    Affected Version From:  v1.0
                    Affected Version To:  v1.0
                    Patch Exists: NO
                    Related CWE: 
                    CPE:  a:oretnom23:simple_student_attendance_system:1.0
                    Platforms Tested:  Mac OSX, XAMPP, Apache, MySQL
                    2023
                    Simple Student Attendance System – Time Based Blind SQL Injection
The Simple Student Attendance System v1.0 is vulnerable to a Time Based Blind SQL Injection. An attacker can exploit this vulnerability by sending a crafted POST request with a malicious payload to the 'id' parameter in the delete_student function of the actions.class.php file. This allows the attacker to perform unauthorized SQL queries, potentially leading to data leakage or manipulation. This exploit has been tested using sqlmap tool.
Mitigation:
					To mitigate this vulnerability, input validation and parameterized queries should be implemented in the application to prevent SQL injection attacks. Additionally, limiting database user privileges and regular security testing can help protect against such exploits.