Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-16823 | A vulnerability classified as critical has been found in PHPGurukul Notice Board System 1.0. This affects an unknown part of the file /search-notice.php. The manipulation of the argument searchdata leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. |
Tue, 10 Jun 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phpgurukul
Phpgurukul notice Board System |
|
| CPEs | cpe:2.3:a:phpgurukul:notice_board_system:1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Phpgurukul
Phpgurukul notice Board System |
Wed, 04 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Jun 2025 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability classified as critical has been found in PHPGurukul Notice Board System 1.0. This affects an unknown part of the file /search-notice.php. The manipulation of the argument searchdata leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | |
| Title | PHPGurukul Notice Board System search-notice.php sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-06-04T13:27:07.903Z
Reserved: 2025-06-03T17:44:01.269Z
Link: CVE-2025-5566
Updated: 2025-06-04T13:27:02.562Z
Status : Analyzed
Published: 2025-06-04T05:15:25.247
Modified: 2025-06-10T15:10:27.370
Link: CVE-2025-5566
No data.
OpenCVE Enrichment
No data.
EUVD