| Título | PHPGurukul Hospital Management System 4.0 SQL Injection |
|---|
| Descripción | PHPGurukul Hospital Management System V4.0 is vulnerable to SQL Injection. The vulnerability is located in the '/hospital/hms/admin/manage-users.php' file via the 'id' parameter. An authenticated remote attacker can exploit this vulnerability to execute arbitrary SQL commands by injecting malicious SQL syntax (e.g., time-based blind injection), which may lead to unauthorized data deletion or sensitive information disclosure. |
|---|
| Fuente | ⚠️ https://github.com/Shaon-Xis/PHPGurukul-HMS-SQLi-PoC/tree/main |
|---|
| Usuario | yan1451 (UID 94854) |
|---|
| Sumisión | 2026-01-31 03:28 (hace 3 meses) |
|---|
| Moderación | 2026-02-07 16:15 (8 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 344882 [PHPGurukul Hospital Management System 4.0 /admin/manage-users.php ID inyección SQL] |
|---|
| Puntos | 20 |
|---|