No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 17 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Tue, 10 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tripath Project
Tripath Project election |
|
| Vendors & Products |
Tripath Project
Tripath Project election |
Fri, 06 Feb 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | eLection 2.0 contains an authenticated SQL injection vulnerability in the candidate management endpoint that allows attackers to manipulate database queries through the 'id' parameter. Attackers can leverage SQLMap to exploit the vulnerability, potentially gaining remote code execution by uploading backdoor files to the web application directory. | |
| Title | eLection 2.0 - 'id' SQL Injection | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-17T16:58:07.357Z
Reserved: 2026-02-03T16:27:45.309Z
Link: CVE-2020-37154
Updated: 2026-02-10T20:33:54.824Z
Status : Awaiting Analysis
Published: 2026-02-07T00:15:55.440
Modified: 2026-02-09T16:08:55.263
Link: CVE-2020-37154
No data.
OpenCVE Enrichment
Updated: 2026-02-09T10:45:18Z