A vulnerability, which was classified as critical, was found in Project Worlds Online Time Table Generator 1.0. This affects an unknown part of the file course_ajax.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-251553 was assigned to this vulnerability.
                
            References
                    | Link | Resource | 
|---|---|
| https://torada.notion.site/SQL-injection-at-course_ajax-php-485d8cca5f8c43dfb1f76c7336a4a45e | Exploit | 
| https://vuldb.com/?ctiid.251553 | Permissions Required | 
| https://vuldb.com/?id.251553 | Permissions Required | 
| https://torada.notion.site/SQL-injection-at-course_ajax-php-485d8cca5f8c43dfb1f76c7336a4a45e | Exploit | 
| https://vuldb.com/?ctiid.251553 | Permissions Required | 
| https://vuldb.com/?id.251553 | Permissions Required | 
Configurations
                    History
                    No history.
Information
                Published : 2024-01-19 19:15
Updated : 2024-11-21 08:47
NVD link : CVE-2024-0730
Mitre link : CVE-2024-0730
CVE.ORG link : CVE-2024-0730
JSON object : View
Products Affected
                projectworlds
- online_time_table_generator
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
