3 results (0.005 seconds)

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 1

A vulnerability, which was classified as critical, has been found in PHPGurukul News Portal 4.1. This issue affects some unknown processing of the file search.php. The manipulation of the argument searchtitle leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%204.md https://vuldb.com/?ctiid.260615 https://vuldb.com/?id.260615 https://vuldb.com/?submit.316291 https://github.com/L1OudFd8cl09/CVE/blob/main/25_07_2024_b.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability classified as critical was found in PHPGurukul News Portal 4.1. This vulnerability affects unknown code of the file /admin/edit-post.php. The manipulation of the argument posttitle leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%203.md https://vuldb.com/?ctiid.260614 https://vuldb.com/?id.260614 https://vuldb.com/?submit.316290 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.9EPSS: 1%CPEs: 1EXPL: 2

SQL Injection vulnerabilities exist in https://phpgurukul.com News Portal Project 3.1 via the (1) category, (2) subcategory, (3) sucatdescription, and (4) username parameters, the server response is about (N) seconds delay respectively which mean it is vulnerable to MySQL Blind (Time Based). An attacker can use sqlmap to further the exploitation for extracting sensitive information from the database. Se presentan vulnerabilidades de inyección SQL en https://phpgurukul.com News Portal Project versión 3.1, por medio de los parámetros (1) category, (2) subcategory, (3) sucatdescription, y (4) username, la respuesta del servidor presenta un retraso de (N) segundos respectivamente lo que significa que es vulnerable a MySQL Blind (Time Based). Un atacante puede usar sqlmap para avanzar en la explotación para extraer información confidencial de la base de datos • https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-37808 https://packetstormsecurity.com/files/163575/News-Portal-Project-3.1-SQL-Injection.html https://www.nu11secur1ty.com/2021/12/cve-2021-37808.html • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •