A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /file/request.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://code-projects.org/ | Product |
| https://github.com/bevennyamande/receiver_request_sample_csrf | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.282615 | Permissions Required Third Party Advisory VDB Entry |
| https://vuldb.com/?id.282615 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.434756 | Third Party Advisory VDB Entry |
Configurations
History
23 Oct 2025, 20:06
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Fabian
Fabian blood Bank Management System |
|
| CPE | cpe:2.3:a:fabian:blood_bank_management_system:1.0:*:*:*:*:*:*:* |
Information
Published : 2024-11-01 00:15
Updated : 2025-10-23 20:06
NVD link : CVE-2024-10605
Mitre link : CVE-2024-10605
CVE.ORG link : CVE-2024-10605
JSON object : View
Products Affected
fabian
- blood_bank_management_system
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
