CVE-2024-9094
code-projects Blood Bank System o-.php sql injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability classified as critical was found in code-projects Blood Bank System 1.0. This vulnerability affects unknown code of the file /admin/blood/update/o-.php. The manipulation of the argument bloodname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
In code-projects Blood Bank System 1.0 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Betroffen ist eine unbekannte Verarbeitung der Datei /admin/blood/update/o-.php. Mittels dem Manipulieren des Arguments bloodname mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-09-22 CVE Reserved
- 2024-09-23 CVE Published
- 2024-09-23 CVE Updated
- 2024-09-23 First Exploit
- 2024-09-28 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://code-projects.org | Product | |
https://vuldb.com/?id.278272 | Technical Description | |
https://vuldb.com/?submit.412254 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/ByKevin1/CVE/blob/main/sql1.md | 2024-09-23 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Code-projects Search vendor "Code-projects" | Blood Bank System Search vendor "Code-projects" for product "Blood Bank System" | 1.0 Search vendor "Code-projects" for product "Blood Bank System" and version "1.0" | en |
Affected
|