CVE | CVE-2023-1352 |
CVE Title | |
Published Date | 2023-03-11T18:15Z |
Modified Date | 2023-03-15T17:37Z |
CWE Type | CWE-89 |
CVSS 3.x | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Description | A vulnerability, which was classified as critical, has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0. This issue affects some unknown processing of the file /admin/login.php. The manipulation of the argument txtusername/txtpassword leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222851. |
References | |
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites. | |
Reference URL | https://github.com/E1CHO/cve_hub/blob/main/covid-19-vaccination%20vlun%20pdf/covid-19-vaccination%20sql(6).pdf |
Reference Description | MISC https://github.com/E1CHO/cve_hub/blob/main/covid-19-vaccination%20vlun%20pdf/covid-19-vaccination%20sql(6).pdf |
Reference URL | https://vuldb.com/?ctiid.222851 |
Reference Description | MISC https://vuldb.com/?ctiid.222851 |
Reference URL | https://vuldb.com/?id.222851 |
Reference Description | MISC https://vuldb.com/?id.222851 |
Tags | Exploit Third Party Advisory |
Sources | NIST MITRE |