Description
A SQL Injection vulnerability was found in /covid-tms/password-recovery.php in PHPGurukul COVID 19 Testing Management System v1.0, which allows remote attackers to execute arbitrary code via the contactno POST request parameter.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-52006 | A SQL Injection vulnerability was found in /covid-tms/password-recovery.php in PHPGurukul COVID 19 Testing Management System v1.0, which allows remote attackers to execute arbitrary code via the contactno POST request parameter. |
References
History
Wed, 27 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phpgurukul
Phpgurukul covid19 Testing Management System |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:phpgurukul:covid19_testing_management_system:1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Phpgurukul
Phpgurukul covid19 Testing Management System |
|
| Metrics |
cvssV3_1
|
Wed, 27 Nov 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A SQL Injection vulnerability was found in /covid-tms/password-recovery.php in PHPGurukul COVID 19 Testing Management System v1.0, which allows remote attackers to execute arbitrary code via the contactno POST request parameter. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-27T15:19:11.501Z
Reserved: 2024-11-20T00:00:00.000Z
Link: CVE-2024-53603
Updated: 2024-11-27T15:08:40.987Z
Status : Analyzed
Published: 2024-11-27T14:15:18.943
Modified: 2025-03-27T17:40:10.067
Link: CVE-2024-53603
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD