Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-52006 | A SQL Injection vulnerability was found in /covid-tms/password-recovery.php in PHPGurukul COVID 19 Testing Management System v1.0, which allows remote attackers to execute arbitrary code via the contactno POST request parameter. |
Wed, 27 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phpgurukul
Phpgurukul covid19 Testing Management System |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:phpgurukul:covid19_testing_management_system:1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Phpgurukul
Phpgurukul covid19 Testing Management System |
|
| Metrics |
cvssV3_1
|
Wed, 27 Nov 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A SQL Injection vulnerability was found in /covid-tms/password-recovery.php in PHPGurukul COVID 19 Testing Management System v1.0, which allows remote attackers to execute arbitrary code via the contactno POST request parameter. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-27T15:19:11.501Z
Reserved: 2024-11-20T00:00:00.000Z
Link: CVE-2024-53603
Updated: 2024-11-27T15:08:40.987Z
Status : Analyzed
Published: 2024-11-27T14:15:18.943
Modified: 2025-03-27T17:40:10.067
Link: CVE-2024-53603
No data.
OpenCVE Enrichment
No data.
EUVD