The Online Marriage Registration System 1.0 post parameter "searchdata" in the user/search.php request is vulnerable to Time Based Sql Injection.
References
Link | Resource |
---|---|
https://phpgurukul.com/online-marriage-registration-system-using-php-and-mysql/ | Product Third Party Advisory |
https://www.exploit-db.com/exploits/49307 | Exploit Third Party Advisory VDB Entry |
https://phpgurukul.com/online-marriage-registration-system-using-php-and-mysql/ | Product Third Party Advisory |
https://www.exploit-db.com/exploits/49307 | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 05:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://phpgurukul.com/online-marriage-registration-system-using-php-and-mysql/ - Product, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/49307 - Exploit, Third Party Advisory, VDB Entry |
14 Nov 2023, 21:00
Type | Values Removed | Values Added |
---|---|---|
First Time |
Phpgurukul online Marriage Registration System
Phpgurukul |
|
CPE | cpe:2.3:a:phpgurukul:online_marriage_registration_system:1.0:*:*:*:*:*:*:* |
Information
Published : 2020-12-21 21:15
Updated : 2024-11-21 05:26
NVD link : CVE-2020-35151
Mitre link : CVE-2020-35151
CVE.ORG link : CVE-2020-35151
JSON object : View
Products Affected
phpgurukul
- online_marriage_registration_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')