First published: Thu Mar 09 2023(Updated: )
A vulnerability classified as critical was found in SourceCodester COVID 19 Testing Management System 1.0. Affected by this vulnerability is an unknown functionality of the file patient-report.php of the component POST Parameter Handler. The manipulation of the argument searchdata leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222661 was assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Phpgurukul Covid19 Testing Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-1300 is critical (9.8).
CVE-2023-1300 affects SourceCodester COVID 19 Testing Management System version 1.0.
CVE-2023-1300 is categorized as a SQL Injection vulnerability.
To fix the SQL Injection vulnerability, update to a patched version of SourceCodester COVID 19 Testing Management System or apply the recommended security patches.
You can find more information about CVE-2023-1300 at the following references: [link1], [link2]