Vulnerability Description
Sourcecodester Covid-19 Directory on Vaccination System1.0 is vulnerable to SQL Injection via the admin/login.php txtusername (aka Username) field.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Covid-19 Directory On Vaccination System Project | Covid-19 Directory On Vaccination System | 1.0 |
Related Weaknesses (CWE)
References
- https://packetstormsecurity.com/files/166481/Covid-19-Directory-On-Vaccination-SExploitThird Party AdvisoryVDB Entry
- https://www.sourcecodester.com/php/15244/design-and-implementation-covid-19-direProduct
- https://packetstormsecurity.com/files/166481/Covid-19-Directory-On-Vaccination-SExploitThird Party AdvisoryVDB Entry
- https://www.sourcecodester.com/php/15244/design-and-implementation-covid-19-direProduct
FAQ
What is CVE-2022-28531?
CVE-2022-28531 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Sourcecodester Covid-19 Directory on Vaccination System1.0 is vulnerable to SQL Injection via the admin/login.php txtusername (aka Username) field.
How severe is CVE-2022-28531?
CVE-2022-28531 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-28531?
Check the references section above for vendor advisories and patch information. Affected products include: Covid-19 Directory On Vaccination System Project Covid-19 Directory On Vaccination System.