The Online Marriage Registration System 1.0 post parameter "searchdata" in the user/search.php request is vulnerable to Time Based Sql Injection.
References
Link | Resource |
---|---|
https://phpgurukul.com/online-marriage-registration-system-using-php-and-mysql/ | Product Third Party Advisory |
https://www.exploit-db.com/exploits/49307 | Exploit Third Party Advisory VDB Entry |
https://phpgurukul.com/online-marriage-registration-system-using-php-and-mysql/ | Product Third Party Advisory |
https://www.exploit-db.com/exploits/49307 | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2020-12-21 21:15
Updated : 2024-11-21 05:26
NVD link : CVE-2020-35151
Mitre link : CVE-2020-35151
CVE.ORG link : CVE-2020-35151
JSON object : View
Products Affected
phpgurukul
- online_marriage_registration_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')