First published: Wed Jul 31 2024(Updated: )
A vulnerability was found in code-projects Online Bus Reservation Site 1.0. It has been rated as critical. This issue affects some unknown processing of the file register.php. The manipulation of the argument Email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273203.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fabianros Online Bus Reservation Site | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7311 has been rated as critical due to its potential for remote SQL injection.
To fix CVE-2024-7311, you should sanitize and validate user inputs in the register.php file to prevent SQL injection.
CVE-2024-7311 affects the online_bus_reservation_site version 1.0, specifically the register.php file.
Yes, CVE-2024-7311 can be exploited remotely due to the vulnerabilities in the way it processes user inputs.
CVE-2024-7311 is an SQL injection vulnerability that allows an attacker to manipulate the application's database queries.