A vulnerability was found in Project Worlds Life Insurance Management System 1.0. It has been classified as critical. This affects an unknown part of the file /editPayment.php. The manipulation of the argument recipt_no leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/peteryang520/Cve-report/blob/main/SQLi-1.md | Exploit | 
| https://vuldb.com/?ctiid.282903 | Permissions Required VDB Entry | 
| https://vuldb.com/?id.282903 | Third Party Advisory VDB Entry | 
| https://vuldb.com/?submit.435410 | Third Party Advisory VDB Entry | 
Configurations
                    History
                    No history.
Information
                Published : 2024-11-03 13:15
Updated : 2024-11-05 19:43
NVD link : CVE-2024-10734
Mitre link : CVE-2024-10734
CVE.ORG link : CVE-2024-10734
JSON object : View
Products Affected
                projectworlds
- life_insurance_management_system
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
