A vulnerability, which was classified as critical, has been found in code-projects Job Recruitment 1.0. This issue affects some unknown processing of the file /activation.php. The manipulation of the argument e_hash leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://code-projects.org/ | Product |
https://github.com/UnrealdDei/cve/blob/main/sql2-rce.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.283871 | Permissions Required VDB Entry |
https://vuldb.com/?id.283871 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.441182 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2024-11-11 18:15
Updated : 2024-11-14 19:14
NVD link : CVE-2024-11076
Mitre link : CVE-2024-11076
CVE.ORG link : CVE-2024-11076
JSON object : View
Products Affected
anisha
- job_recruitment