Логотип exploitDog
bind:CVE-2023-6648
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-6648

Количество 3

Количество 3

nvd логотип

CVE-2023-6648

около 2 лет назад

A vulnerability, which was classified as critical, was found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file password-recovery.php. The manipulation of the argument username/contactno leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-8r6v-wv2q-2cg2

около 2 лет назад

A vulnerability, which was classified as critical, was found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file password-recovery.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247341 was assigned to this vulnerability.

CVSS3: 7.3
EPSS: Низкий
fstec логотип

BDU:2024-00226

около 2 лет назад

Уязвимость сценария password-recovery.php программного средства управления тестированием на вирус Нипах PHPGurukul Nipah Virus Testing Management System, позволяющая нарушителю выполнять произвольные SQL-запросы к базе данных

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-6648

A vulnerability, which was classified as critical, was found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file password-recovery.php. The manipulation of the argument username/contactno leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 7.3
0%
Низкий
около 2 лет назад
github логотип
GHSA-8r6v-wv2q-2cg2

A vulnerability, which was classified as critical, was found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file password-recovery.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247341 was assigned to this vulnerability.

CVSS3: 7.3
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2024-00226

Уязвимость сценария password-recovery.php программного средства управления тестированием на вирус Нипах PHPGurukul Nipah Virus Testing Management System, позволяющая нарушителю выполнять произвольные SQL-запросы к базе данных

CVSS3: 9.8
0%
Низкий
около 2 лет назад

Уязвимостей на страницу