Submeter #797280: PHPGurukul Company Visitors Management System 2.0 SQL Injectioninformação

TítuloPHPGurukul Company Visitors Management System 2.0 SQL Injection
DescriçãoA SQL injection vulnerability was identified within the "/forgot-password.php" file of the "Company Visitors Management System" project. The root cause lies in the fact that attackers can inject malicious code via the parameter "email". This input is then directly utilized in SQL queries without undergoing proper sanitization or validation processes. As a result, attackers are able to fabricate input values, manipulate SQL queries, and execute unauthorized operations.
Fonte⚠️ https://github.com/f1rstb100d/CVE/issues/46
Utilizador
 Anonymous User
Submissão05/04/2026 05h45 (há 20 dias)
Moderação13/04/2026 10h25 (8 days later)
EstadoDuplicado
Entrada VulDB310330 [PHPGurukul Company Visitor Management System 1.0 /forgot-password.php email Injeção SQL]
Pontos0

Want to know what is going to be exploited?

We predict KEV entries!