A vulnerability classified as critical was found in SourceCodester COVID 19 Testing Management System 1.0. Affected by this vulnerability is an unknown functionality of the file patient-report.php of the component POST Parameter Handler. The manipulation of the argument searchdata leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222661 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/mhz2846415362/bug_report/blob/main/vendors/unyasoft/COVID%2019%20Testing%20Management%20System/SQLi-1.md | Exploit |
https://vuldb.com/?ctiid.222661 | Third Party Advisory |
https://vuldb.com/?id.222661 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2023-03-09T21:30:17.774Z
Updated: 2023-10-21T07:55:11.387Z
Reserved: 2023-03-09T21:30:02.210Z
Link: CVE-2023-1300
JSON object: View
NVD Information
Status : Modified
Published: 2023-03-09T22:15:51.880
Modified: 2024-05-17T02:17:57.317
Link: CVE-2023-1300
JSON object: View
Redhat Information
No data.
CWE