A vulnerability was found in Project Worlds Life Insurance Management System 1.0. It has been classified as critical. This affects an unknown part of the file /editPayment.php. The manipulation of the argument recipt_no leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/peteryang520/Cve-report/blob/main/SQLi-1.md | Exploit |
https://vuldb.com/?ctiid.282903 | Permissions Required VDB Entry |
https://vuldb.com/?id.282903 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.435410 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2024-11-03 13:15
Updated : 2024-11-05 19:43
NVD link : CVE-2024-10734
Mitre link : CVE-2024-10734
CVE.ORG link : CVE-2024-10734
JSON object : View
Products Affected
projectworlds
- life_insurance_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')