First published: Mon Dec 21 2020(Updated: )
The Online Marriage Registration System 1.0 post parameter "searchdata" in the user/search.php request is vulnerable to Time Based Sql Injection.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Online Marriage Registration System Project Online Marriage Registration System | =1.0 | |
phpgurukul Online Marriage Registration System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-35151.
The title of this vulnerability is 'The Online Marriage Registration System 1.0 post parameter searchdata in the user/search.php request is vulnerable to Time Based Sql Injection'.
The severity of CVE-2020-35151 is high with a severity value of 8.8.
The vulnerability CVE-2020-35151 manifests as a Time Based Sql Injection vulnerability in the Online Marriage Registration System 1.0 post parameter 'searchdata' in the user/search.php request.
Yes, there are references available for CVE-2020-35151. You can find them at the following links: https://phpgurukul.com/online-marriage-registration-system-using-php-and-mysql/ and https://www.exploit-db.com/exploits/49307.