Description
A vulnerability, which was classified as critical, has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0. This issue affects some unknown processing of the file /admin/login.php. The manipulation of the argument txtusername/txtpassword leads to sql injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222851.
Published: 2023-03-11
Score: 5.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-23610 A vulnerability, which was classified as critical, has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0. This issue affects some unknown processing of the file /admin/login.php. The manipulation of the argument txtusername/txtpassword leads to sql injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222851.
History

No history.

Subscriptions

Design And Implementation Of Covid-19 Directory On Vaccination System Project Design And Implementation Of Covid-19 Directory On Vaccination System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2024-08-02T05:40:59.926Z

Reserved: 2023-03-11T17:39:51.188Z

Link: CVE-2023-1352

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-03-11T18:15:43.603

Modified: 2024-11-21T07:39:00.643

Link: CVE-2023-1352

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses