Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18744 | A vulnerability classified as critical has been found in PHPGurukul Directory Management System 1.0. Affected is an unknown function of the file /searchdata.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. |
Thu, 26 Jun 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phpgurukul
Phpgurukul directory Management System |
|
| CPEs | cpe:2.3:a:phpgurukul:directory_management_system:1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Phpgurukul
Phpgurukul directory Management System |
Fri, 20 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Jun 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability classified as critical has been found in PHPGurukul Directory Management System 1.0. Affected is an unknown function of the file /searchdata.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |
| Title | PHPGurukul Directory Management System searchdata.php sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-06-20T13:50:12.910Z
Reserved: 2025-06-19T10:13:32.151Z
Link: CVE-2025-6330
Updated: 2025-06-20T13:50:03.523Z
Status : Analyzed
Published: 2025-06-20T10:15:23.030
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-6330
No data.
OpenCVE Enrichment
Updated: 2025-06-23T08:20:14Z
EUVD