First published: Fri Sep 29 2023(Updated: )
A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file edit_parcel.php. The manipulation of the argument email leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240884.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mayuri K Best Courier Management System | =1.0 | |
Mayurik Best Courier Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-5271 is high with a CVSS score of 8.8.
The affected software of CVE-2023-5271 is Mayuri K Best Courier Management System 1.0.
CVE-2023-5271 is a SQL injection vulnerability.
To fix CVE-2023-5271, apply the latest patch or update provided by the software vendor.
You can find more information about CVE-2023-5271 on the following references: [Link 1](https://github.com/E1CHO/cve_hub/blob/main/Best%20courier%20management%20system/Best%20courier%20management%20system%20project%20in%20php%20-%20vuln%203.pdf), [Link 2](https://vuldb.com/?ctiid.240884), [Link 3](https://vuldb.com/?id.240884).