CVE-2024-9327
code-projects Blood Bank System forgot.php sql injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability was found in code-projects Blood Bank System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /forgot.php. The manipulation of the argument useremail leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
In code-projects Blood Bank System 1.0 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Das betrifft eine unbekannte Funktionalität der Datei /forgot.php. Durch Manipulieren des Arguments useremail mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-09-28 CVE Reserved
- 2024-09-29 CVE Published
- 2024-09-30 CVE Updated
- 2024-09-30 First Exploit
- 2024-10-03 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://code-projects.org | Product | |
https://vuldb.com/?id.278836 | Technical Description | |
https://vuldb.com/?submit.415469 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/Lynn1236-cell/cve1/blob/main/sql3.md | 2024-09-30 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Code-projects Search vendor "Code-projects" | Blood Bank System Search vendor "Code-projects" for product "Blood Bank System" | 1.0 Search vendor "Code-projects" for product "Blood Bank System" and version "1.0" | en |
Affected
|