First published: Mon Nov 28 2022(Updated: )
SQL injection in School Management System 1.0 allows remote attackers to modify or delete data, causing persistent changes to the application's content or behavior by using malicious SQL queries.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
lahirudanushka School Management System | =1.0 | |
Simple School Management System (code-projects) | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36193 has a moderate severity rating due to its potential for data modification and deletion.
To fix CVE-2022-36193, sanitize and validate all SQL queries and implement prepared statements to prevent SQL injection.
CVE-2022-36193 allows remote attackers to execute malicious SQL queries that can modify or delete data.
CVE-2022-36193 affects version 1.0 of School Management System developed by both lahirudanushka and the Simple School Management System project.
Yes, using secure coding practices, such as parameterized queries and input validation, can help prevent vulnerabilities like CVE-2022-36193.