A SQL injection vulnerability was found in 'ajax.php' of Sourcecodester Simple Library Management System 1.0. This vulnerability stems from insufficient user input validation of the 'username' parameter, allowing attackers to inject malicious SQL queries.
References
Link | Resource |
---|---|
https://github.com/CveSecLook/cve/issues/49 | Exploit Third Party Advisory |
https://github.com/CveSecLook/cve/issues/49 | Exploit Third Party Advisory |
Configurations
History
23 Apr 2025, 14:19
Type | Values Removed | Values Added |
---|---|---|
First Time |
Nikhil-bhalerao simple Library Management System
Nikhil-bhalerao |
|
CPE | cpe:2.3:a:nikhil-bhalerao:simple_library_management_system:1.0:*:*:*:*:*:*:* | |
References | () https://github.com/CveSecLook/cve/issues/49 - Exploit, Third Party Advisory |
Information
Published : 2024-07-17 20:15
Updated : 2025-04-23 14:19
NVD link : CVE-2024-40402
Mitre link : CVE-2024-40402
CVE.ORG link : CVE-2024-40402
JSON object : View
Products Affected
nikhil-bhalerao
- simple_library_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')