A vulnerability was found in code-projects Bus Dispatch and Information System 1.0. It has been classified as critical. This affects an unknown part of the file adminHome.php. The manipulation of the argument reach_city leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229281 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/mrwwrrhh/Bus_Dispatch_and_Information_System/blob/main/Bus%20Dispatch%20and%20Information%20System%20in%20login_info%20has%20Sql%20injection%20vulnerabilities.pdf | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.229281 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.229281 | Third Party Advisory |
https://github.com/mrwwrrhh/Bus_Dispatch_and_Information_System/blob/main/Bus%20Dispatch%20and%20Information%20System%20in%20login_info%20has%20Sql%20injection%20vulnerabilities.pdf | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.229281 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.229281 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-05-17 20:15
Updated : 2024-11-21 07:59
NVD link : CVE-2023-2775
Mitre link : CVE-2023-2775
CVE.ORG link : CVE-2023-2775
JSON object : View
Products Affected
bus_dispatch_and_information_system_project
- bus_dispatch_and_information_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')