A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /bloodrequest.php. The manipulation of the argument msg leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://code-projects.org/ | Product |
| https://gist.github.com/higordiego/62ad5208270c67834d02818d6ba44126 | Exploit Mitigation Third Party Advisory |
| https://vuldb.com/?ctiid.281960 | Permissions Required VDB Entry |
| https://vuldb.com/?id.281960 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.431784 | Third Party Advisory VDB Entry |
Configurations
History
23 Oct 2025, 20:06
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Fabian
Fabian blood Bank Management System |
|
| CPE | cpe:2.3:a:fabian:blood_bank_management_system:1.0:*:*:*:*:*:*:* |
Information
Published : 2024-10-27 15:15
Updated : 2025-10-23 20:06
NVD link : CVE-2024-10419
Mitre link : CVE-2024-10419
CVE.ORG link : CVE-2024-10419
JSON object : View
Products Affected
fabian
- blood_bank_management_system
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
