A vulnerability has been found in code-projects Blood Bank Management up to 1.0 and classified as critical. This vulnerability affects unknown code of the file /abs.php. The manipulation of the argument search leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://code-projects.org/ | Product |
| https://gist.github.com/higordiego/46090516ba1b13fe3d2607ab4c0114f1 | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.281938 | Permissions Required Third Party Advisory VDB Entry |
| https://vuldb.com/?id.281938 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.431491 | Third Party Advisory VDB Entry |
Configurations
History
23 Oct 2025, 20:06
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Fabian
Fabian blood Bank Management System |
|
| CPE | cpe:2.3:a:fabian:blood_bank_management_system:1.0:*:*:*:*:*:*:* |
Information
Published : 2024-10-27 03:15
Updated : 2025-10-23 20:06
NVD link : CVE-2024-10408
Mitre link : CVE-2024-10408
CVE.ORG link : CVE-2024-10408
JSON object : View
Products Affected
fabian
- blood_bank_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
