15 results (0.008 seconds)

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 2

A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /file/request.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. • https://github.com/bevennyamande/CVE-2024-10605 https://code-projects.org https://github.com/bevennyamande/receiver_request_sample_csrf https://vuldb.com/?ctiid.282615 https://vuldb.com/?id.282615 https://vuldb.com/?submit.434756 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 2

A vulnerability has been found in code-projects Blood Bank Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /file/updateprofile.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/bevennyamande/CVE-2024-10557 https://code-projects.org https://github.com/bevennyamande/bloodbank_profile_update_csrf https://vuldb.com/?ctiid.282559 https://vuldb.com/?id.282559 https://vuldb.com/?submit.433057 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 2

A vulnerability, which was classified as problematic, has been found in code-projects Blood Bank Management System 1.0. Affected by this issue is some unknown functionality of the file /file/delete.php. The manipulation of the argument bid leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/bevennyamande/CVE-2024-10448 https://code-projects.org https://github.com/bevennyamande/bloodbank_delete_csrf_attack https://vuldb.com/?ctiid.282008 https://vuldb.com/?id.282008 https://vuldb.com/?submit.432501 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /bloodrequest.php. The manipulation of the argument msg leads to cross site scripting. The attack may be launched remotely. • https://code-projects.org https://gist.github.com/higordiego/62ad5208270c67834d02818d6ba44126 https://vuldb.com/?ctiid.281960 https://vuldb.com/?id.281960 https://vuldb.com/?submit.431784 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /file/infoAdd.php. The manipulation of the argument bg leads to sql injection. The attack can be launched remotely. • https://code-projects.org https://gist.github.com/higordiego/25a103a1fe84c4db4530e68d2f998d11 https://vuldb.com/?ctiid.281959 https://vuldb.com/?id.281959 https://vuldb.com/?submit.431782 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •