Railway Reservation System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'byname' parameter of the train.php resource does not validate the characters received and they are sent unfiltered to the database.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-52733 | Railway Reservation System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'byname' parameter of the train.php resource does not validate the characters received and they are sent unfiltered to the database. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 23 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2025-04-23T16:21:51.502Z
Reserved: 2023-11-17T17:00:26.199Z
Link: CVE-2023-48689
Updated: 2024-08-02T21:37:54.667Z
Status : Modified
Published: 2023-12-21T21:15:11.130
Modified: 2024-11-21T08:32:15.797
Link: CVE-2023-48689
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD