| Title | code-projects.org Online Bus Reservation System v1.0 SQL Injection |
|---|
| Description | A SQL injection vulnerability was found in the Online Bus Reservation System project of code-projects. The reason is that the id parameter is not filtered in seatlocation.php, which allows malicious SQL statements to be spliced and cause vulnerabilities. |
|---|
| Source | ⚠️ https://github.com/zzZxby/Vulnerability-Exploration/blob/main/Online%20Bus%20Reservation%20System/Online%20Bus%20Reservation%20System2.md |
|---|
| User | zzzxby (UID 72794) |
|---|
| Submission | 04/20/2025 03:04 PM (11 months ago) |
|---|
| Moderation | 05/02/2025 10:50 PM (12 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 307335 [code-projects Online Bus Reservation System 1.0 /seatlocation.php ID sql injection] |
|---|
| Points | 17 |
|---|