Severity
5.3MEDIUM
EPSS
0.0%
top 84.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 19
Latest updateJun 20

Description

A vulnerability was found in PHPGurukul COVID19 Testing Management System 2021. It has been rated as problematic. This issue affects some unknown processing of the file /search-report-result.php. The manipulation of the argument q leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

🔴Vulnerability Details

2
GHSA
GHSA-rcj2-gxfq-h9qq: A vulnerability was found in PHPGurukul COVID19 Testing Management System 20212025-06-20
CVEList
PHPGurukul COVID19 Testing Management System search-report-result.php cross site scripting2025-06-19

📋Vendor Advisories

1
Microsoft
The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML f2019-01-08
CVE-2025-6285 (MEDIUM CVSS 5.3) | A vulnerability was found in PHPGur | cvebase.io