Description
PHPGurukul Daily Expense Tracker System 1.0 is vulnerable to SQL injection, as demonstrated by the email parameter in index.php or register.php. The SQL injection allows to dump the MySQL database and to bypass the login prompt.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-2571 | PHPGurukul Daily Expense Tracker System 1.0 is vulnerable to SQL injection, as demonstrated by the email parameter in index.php or register.php. The SQL injection allows to dump the MySQL database and to bypass the login prompt. |
References
| Link | Providers |
|---|---|
| https://frostylabs.net/writeups/cve-2020-10106/ |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T10:50:57.819Z
Reserved: 2020-03-05T00:00:00.000Z
Link: CVE-2020-10106
No data.
Status : Modified
Published: 2020-03-05T13:15:11.310
Modified: 2024-11-21T04:54:49.587
Link: CVE-2020-10106
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD