A vulnerability has been found in code-projects Hospital Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file user-login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://code-projects.org/ | Product |
| https://github.com/teachersongsec/cve/issues/1 | Exploit Issue Tracking Third Party Advisory |
| https://vuldb.com/?ctiid.276799 | Permissions Required |
| https://vuldb.com/?id.276799 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.403125 | Third Party Advisory VDB Entry |
Configurations
History
23 Oct 2025, 20:06
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:fabian:hospital_management_system:1.0:*:*:*:*:*:*:* | |
| First Time |
Fabian
Fabian hospital Management System |
Information
Published : 2024-09-08 05:15
Updated : 2025-10-23 20:06
NVD link : CVE-2024-8569
Mitre link : CVE-2024-8569
CVE.ORG link : CVE-2024-8569
JSON object : View
Products Affected
fabian
- hospital_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
