A vulnerability has been found in code-projects Blood Bank Management up to 1.0 and classified as critical. This vulnerability affects unknown code of the file /abs.php. The manipulation of the argument search leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://code-projects.org/ | Product |
https://gist.github.com/higordiego/46090516ba1b13fe3d2607ab4c0114f1 | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.281938 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.281938 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.431491 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2024-10-27 03:15
Updated : 2024-10-29 20:44
NVD link : CVE-2024-10408
Mitre link : CVE-2024-10408
CVE.ORG link : CVE-2024-10408
JSON object : View
Products Affected
fabianros
- blood_bank_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')