A vulnerability was found in PHP-Login 1.0. It has been declared as critical. This vulnerability affects the function checkLogin of the file login/scripts/class.loginscript.php of the component POST Parameter Handler. The manipulation of the argument myusername leads to sql injection. The attack can be initiated remotely. Upgrading to version 2.0 is able to address this issue. The patch is identified as 0083ec652786ddbb81335ea20da590df40035679. It is recommended to upgrade the affected component. VDB-228022 is the identifier assigned to this vulnerability.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/ipoelnet/php-login/commit/0083ec652786ddbb81335ea20da590df40035679 | Patch | 
| https://github.com/ipoelnet/php-login/releases/tag/v2.0 | Release Notes | 
| https://vuldb.com/?ctiid.228022 | Third Party Advisory | 
| https://vuldb.com/?id.228022 | Third Party Advisory | 
| https://github.com/ipoelnet/php-login/commit/0083ec652786ddbb81335ea20da590df40035679 | Patch | 
| https://github.com/ipoelnet/php-login/releases/tag/v2.0 | Release Notes | 
| https://vuldb.com/?ctiid.228022 | Third Party Advisory | 
| https://vuldb.com/?id.228022 | Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 02:45
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : 7.5
         v3 : 7.3  | 
| References | () https://github.com/ipoelnet/php-login/commit/0083ec652786ddbb81335ea20da590df40035679 - Patch | |
| References | () https://github.com/ipoelnet/php-login/releases/tag/v2.0 - Release Notes | |
| References | () https://vuldb.com/?ctiid.228022 - Third Party Advisory | |
| References | () https://vuldb.com/?id.228022 - Third Party Advisory | 
07 Nov 2023, 02:29
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-89 | 
20 Oct 2023, 12:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | A vulnerability was found in PHP-Login 1.0. It has been declared as critical. This vulnerability affects the function checkLogin of the file login/scripts/class.loginscript.php of the component POST Parameter Handler. The manipulation of the argument myusername leads to sql injection. The attack can be initiated remotely. Upgrading to version 2.0 is able to address this issue. The patch is identified as 0083ec652786ddbb81335ea20da590df40035679. It is recommended to upgrade the affected component. VDB-228022 is the identifier assigned to this vulnerability. | |
| CWE | 
12 May 2023, 16:22
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (MISC) https://github.com/ipoelnet/php-login/commit/0083ec652786ddbb81335ea20da590df40035679 - Patch | |
| References | (MISC) https://vuldb.com/?id.228022 - Third Party Advisory | |
| References | (MISC) https://vuldb.com/?ctiid.228022 - Third Party Advisory | |
| References | (MISC) https://github.com/ipoelnet/php-login/releases/tag/v2.0 - Release Notes | |
| First Time | 
        
        Php-login Project
         Php-login Project php-login  | 
|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 9.8  | 
| CPE | cpe:2.3:a:php-login_project:php-login:1.0:*:*:*:*:*:*:* | 
06 May 2023, 01:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-05-06 01:15
Updated : 2024-11-21 02:45
NVD link : CVE-2016-15031
Mitre link : CVE-2016-15031
CVE.ORG link : CVE-2016-15031
JSON object : View
Products Affected
                php-login_project
- php-login
 
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
